The CIA
and the Cult
of Intelligence
Victor Marchetti
and
John D. Marks
AND YE SHALL KNOW THE TRUTH
AND THE TRUTH SHALL MAKE YOU FREE.
John, viii: 32
(inscribed on the marble wall of the
main lobby at CIA headquartere,
Langley, Virginia)
A LAUREL BOOK
Published by
Dell Publishing Co.. Inc.
I Dag Hammarskjold Plazii
New York. New York IUI)I7
To Btmict and Barhan
CopyrighiO 1974. I980by Victor Miirchelti and John D. Marks
Introduction copyright C I'JSd by Anthony Lewis
All rights reserved under Inlcrnutionul and Pan-American
Copyright Conventions. For inlornution address
Alfred A Knopf. Inc . New York. New York.
Laurel (B TM A74fi23. Dell l>uhli.shing Co.. Inc.
ISBN: I)-4411..1I2<JK I
Published by arrangement with Alfred A. Knopf. Inc.
Printed in the United States nf America
July mi
10 9 8 7 6 5 4
WFH
CONTENTS
Iniroduciion by Anthony Lewis ix
Publisher's Note xix
Authors' Prefaces xx
Acknowledgments xxv
Introduction by Melvin L. Wulf xxvi
PART I
ONE The Cult of Intelligence 3
TWO The Clandestine Theory 12
THREE The CIA and the Intelligence
Community 49
PART 11
FOUR Special Operations 99
FIVE Proprietary Organizations 118
SIX Propaganda and Disinformation 137
SEVEN Espionage and Counterespionage 1S8
PART 111
EIGHT The Clandestine Mentality 205
NINE Intelligence and Policy 248
TEN Controlling the CIA 274
ELEVEN Conclusions 317
Appendix The Bissell Philosophy 325
Index 347
INTRODUCTION
by Anthony Lewis
Few books change national attitudes. This one did. When it
was first published in 1974, the Central Intelligence Agency
was regarded by most Americans who had heard of it as an
unusually skillful, wise, and successful branch of the United
States Government. The CIA and the Cull of Intelligence
began a process of public reappraisal — a process that contin-
ued through newspaper reports, the work of a presidential
commission, and congressional hearings. Over the years the
tide of opinion ebbed and flowed; the CIA lost and then
regained much of its political support. But there was a
lasting change in attitudes, I think: bringing a degree of
skepticism toward the agency, an unwillingness to let it
continue enjoying a total exemption from the scrutiny to
which the Constitution generally makes government subject.
What Victor Marchetti and John Marks did was a classic
vindication of the American constitutional theory that public
knowledge is essential to both democratic and effective
government. Not just the First Amendment but the whole
system constructed at the Philadelphia convention in 1787
rests on the premise of an informed electorate, holding its
rulers accountable and thus preventing the corruption of power.
As Justice Brandeis put it a century and a half later: "Sunshine
is the best of disinfectants." Marchetti and Marks let light in
on the work of the CIA. They supplied facts where there
had been none.
It is difficult, years later, to remember our state of permis-
sive ignorance concerning the CIA. I do not exclude
myself — or most journalists. We thought of the agency as
better informed than the State or Defense departments, and
rather more on the liberal side in international affairs. We
knew men who worked out in Langley; they were notably
well-bred, articulate, perhaps a bit bookish — certainly not
the sort of people to conspire against freely elected govern-
ments or plot the assassination of Left Wing leaders. That
faith survived the Bay of Pigs intact. For the most part it
even survived the Vietnam War, which shattered the general
X
The CIA and the Cult of Intelligence
postwar love affair between the Washington press corps and
the government, as the press learned that officials did not
know more and could not be trusted to advance shared
values.
Marchetti and Marks showed us that the Central Intelli-
gence Agency, too, had made mistakes: not just slips or
human errors but grave errors of policy. They miide us
aware, dramatically, that the agency not only engaged in
classic intelligence work — the collecting of information by
one means or another — but also intervened in the political
process of other countries by covert actions: subsidies to
favored parties, dirty tricks, the supply of arms. They also
corrected a general belief that the CIA concentrated its
efforts on the Soviet Union. In fact, they said, "The agency
works mainly in the Third World," in relatively small and
weak countries — and there, "at least since the CIA
has lost many more battles than it has won, even by its
own standards."
In that paragraph of their manuscript, Marchetti and Marks
listed African, Asian, and Latin American countries that
had been the targets of CIA covert intervention. But it is
only now, years afterward, that we are able to read some of
the names. The list was struck out by CIA censors in 1973,
and the courts upheld the censorship. Further administrative ^
appeals finally resulted in permission to publish these coun-
tries from the original list: Chile, the Congo, Cambodia,
Laos, Vietnam, the Philippines. (See p. 320.) How fast the
world moves: since the original censorship, the Congo has
changed its name to Zaire, Chile has been taken over by a
military junta, and Cambodia, Laos, and Vietnam have all
come under the control of what was in 1972 the Communist
regime of North Vietnam.
There is a great irony attached to The CIA and the Cult of
Intelligence. The book was censored, and the legal theory
adopted by the courts to justify that censorship was in my
judgment the most dangerous defeat in many years for
Americans' freedom to speak and write and read without
official approval. Yet despite the censorship, Marchetti and
Marks reached the public with their facts and their criticism
of governmental conduct, just as the Constitution intended.
Indeed, in a fascinating way, the heavy hand of the CIA
censors and of the courts actually helped them to get their
Introduction by Anthony Lewis
xi
message across: the CIA helped to destroy its own myth of
wisdom and efficiency.
The way it happened was this: CIA officials read the
manuscript in 1973 and told Marchetti and Marks that they
had to remove 339 passages, nearly a fifth of the book. The
officials may have thought that the authors or the publisher,
Alfred A. Knopf, would lose interest and drop the whole
idea. They did not. First Marchetti and Marks and their
lawyer — Melvin L. Wulf, then legal director of the Ameri-
can Civil Liberties Union — argued each of the deletions
with the agency. Some of them were manifestly absurd: the
fact, for example, that Richard Helms of the CIA. at a
National Security Council meeting, had mispronounced the
name of the Malagasy Republic. Many others were facts
long since published: not secrets at all. After long negotia-
tions the CIA yielded on 171 items, not out of kindness but
because officials knew that every deletion was going to be
contested in court and they did not want to look foolish.
That left 168 censored passages. And then Knopf decided to
go ahead and publish the book with blanks for those passages,
and with the sections that the CIA had originally cut but
then restored printed in boldface.
The result was a dramatic demonstration of how censor-
ship works: the arbitrariness, the design very often to pre-
vent official embarrassment rather than protect real secrets.
The book had special impact. And some people who mat-
tered noticed how far the CIA had gone to stop disclosure of
its blunders, abuses of power, and mistaken policies. I think
it is fair to say that the doubts raised then led in time to the
investigative reports by Seymour Hersh of The New York
Times, the Rockefeller Commission, and the Senate Intelli-
gence Committee under Senator Frank Church of Idaho.
The legal device by which the CIA was ib\e to see the
manuscript in the first place, and censor it, was an ingenious
one. Victor Marchetti had been an official of the agency
and. like other employees, had signed a promise not to
disclose secrets he had learned there, while on the job or
later. These secrecy agreements had always been considered
a way of alerting CIA employees to their responsibility and
of putting moral pressure on them, and of course they could
be fired for breaking the promise. But the agreements were
not thought to be legally binding; in fact, William Colby,
later Director of Central Intelligence, told a congressional
xii The CIA and the Cull of Intelligence
committee that the agency had no way to get a court to stop
leaks. Then, when the CIA officials learned that Marchetti
was planning to write a book, they went into court and
claimed that his agreement was a legally binding "contract,"
enforceable by an injunction against Marchetti. The courts
so held, and they subjected Victor Marchetti to an order
unique in American history. For the rest of his life, he was
forbidden to disclose "in any manner" — writing, conversation,
whatever — any classified information that he had learned
while at the CIA, unless he got official clearance first.
As I write, eight years later, that order still stands. And
over the years the CIA has enforced it with what could be
called niggling rigor. Agency representatives have let Marchetti
know they were in the audience at meetings he was to
address, so he had better not say anything out of line. Once,
on Canadian radio, he referred to a CIA experiment in
wiring cats with minimicrophones; the government complained
that he had violated the injunction.
What makes all this so extraordinary, legally, is that the
First Amendment frowns on "prior restraints": orders, like
the one against Marchetti, that prevent someone from writ-
ing or speaking except on terms approved by authorities.
The First Amendment says that Congress shall make no law
"abridging the freedom of speech, or of the press." In the
great case of Sear v. Minnesota, in 1931, the Supreme Court
said that the "chief purpose" of those words had been to
make sure this country would not have a system of prior
censorship like the one that had existed in seventeenth-
century England, when nothing could be printed without an
official license. Mow, then, can the courts have applied just
such a system to Victor Marchetti (and, as co-author of this
book, John Marks)? l~he answer is hard to find as one reads
the opinions; judges have not faced the problem squarely.
But their logic seems to be that Marchetti, and others who
work for the CIA, waive their First Amendment rights when
they take the job and sign the secrecy agreement. Even if it
were that easy to give up one's constitutional rights — and the
courts have usually said that it is not — there would still be
another problem. It has been the rule in this country that
officials cannot impose regulations unless Congress autho-
rizes them, and especially not when constitutional rights are
involved. Tlius in 1959 the Supreme Court said the Defense
Department could not use a security system that relied on
Introduction by Anthony Lewis
xiii
anonymous accusers because Congress and the President
had not clearly authorized such a system. Yet Congress had
never considered, much less approved, the theory of censor-
ship by "contract" imposed on Marchetti and Marks.
Melvin L. Wulf, in his introduction to the original edition
of this book, describes how the case developed — how the
government advanced and the courts approved the sweeping
theory of Secrecy by Contract. To that account 1 can add
one or two observations from a different perspective.
First, it is necessary to say a word about "secrets." Even
in the United States, the most open of countries, the average
citizen still tends to be impressed when a government official
talks about "secrets" or "classified information." And of
course there are real secrets, which deserve protection: codes,
for instance, or the plans for nuclear retaliation to an enemy
attack. But the overwhelming proportion of the millions of
documents classified by federal officials are routine affairs of
no real security interest. That fact, known to anyone who
deals regularly with the Washington bureaucracy, is beauti-
fully demonstrated by this book itself. Consider these items
that the CIA originally tried to censor and then allowed to
be published in the original edition:
• "The Chilean election was scheduled for the following
September, and Allende, a declared Marxist, was one of the
principal candidates." (See p. 12.)
• "Henry Kissinger, the single most powerful man at the
forty-committee meeting on Chile." (See p. 15.)
• "As incredible as it may seem in retrospect, some of the
CIA"s economic analysts (and many other officials in
Washington) were in the early 1960s still inclined to accept
much of Peking's propaganda as to the success of Mao's
economic experiment. ■ (See p. 103.)
litis new edition provides further evidence of the foolish-
ness so often covered by claims that a disclosure would
threaten the national security. It includes twenty-five pas-
sages censored when the book was originally published but
released after years of further administrative proceedings.
Looking at these supposed "secrets," the reader is bound to
wonder about the good faith of the CIA censors, or their
common sense.
One of these newly published items is about a chemical
that makes mud more slippery. The CIA thought of drop-
ping it on the Ho Chi Minh Trail during the rainy season,
xiv The CIA and the Cull of Intelligence
hoping to interrupt the Vietnamese supply route. (See p.
107.) The idea didn't work, and it was all over before 1974,
but the censors still kept it out.
Another passage now published said that the Soviets had
electronic bugs in the American embassy code room in
Moscow — and were able to translate the sounds of typewrit-
ers into letters. (See p. 186.) The bugs had long since been
found, the leak ended. Tlie Russians knew what they had
been doing. From whom was it being kept a secret?
Most bewildering of all is a series of censored items about
Africa. The book describes a meeting of the National Se-
urity Council under President Nixon in December 1969. After
the first sentence the censors cut out a passage. Now re-
stored (p. 248). it reads: "The purpose of this session was to
decide what American policy should be toward the govern-
ments of southern Africa."
A few lines down, the censors cut in midsentence: "There
was sharp disagreement within the government on how hard
a line the United States should take with the ..." Restored,
it goes on: . . white-minority regimes of South Africa,
Rhodesia, and the Portuguese colonies in Africa."
Then two words were cut from this sentence: "Henry
Kissinger talked about the kind of general posture the United
States could maintain toward the and out-
lined the specific policy options open to the President." The
missing words turn out to be: "white regimes."
Finally, the censors cut a reference to the fact that Kissinger
had sent a National Security Study Memorandum (NSSM 39)
to departments interested in southern Africa. NSSM 39 was
in fact published and widely discussed in 1974. It took the
view that the various movements for majority rule in south-
ern Africa were unlikely to succeed soon.
To the extent that those censored passages on Africa
point anywhere, it is toward a discussion of policy. Tlie
Kissinger-Nixon policy was founded on the belief that the
Portuguese would hold on to their African colonies indef-
initely. Within a few years that premise was shattered, and
the whole policy had to be reappraised. Is there any serious
argument of security that the American public should not
have been allowed, five years afterward, to reflect on the
wisdom of the policy and the way it was made? What has it
got to do with CIA "secrets"?
Second, there is a misconception that the legal theory
Introduction by Anthony Lewis
XV
developed in the Marchetti case allows the CIA to suppress
something by an ex-employee only if the agency can con-
vince the courts of a genuine threat to security. This was the
belief, amazingly, of a twenty-six-year CIA veteran. Cord
Meyer, who wrote a book about his career. He had trouble
clearing it through the agency censors, spending a lot of time
and money to prove that material once classified hud long
since become public. Then Meyer wrote a newspaper col-
umn about his troubles, saying that the censors even tried to
delete "whole sections of a chapter describing how a typical
KGB station operates abroad, " even though that could hardly
be a secret to the KGB. But he concluded that what he
called "peacetime censorship" was not too dangerous, for
this reason:
Fortunately, the Federal courts have held that it is
not sufficient for the government to prove that informa-
tion has been stamped "secret." The burden of proof is
on the government to demonstrate that release of the
information could cause damage to the national security.
Unfortunately, Meyer's statement is the opposite of the
truth. In the Marchetti case, the courts held precisely that
they would not weigh the possible damage of any censored
passage to the national security; it was enough if the CIA
could show simply that something had been included in a
document stamped secret while Marchetti was in the agency
and had not been officially released since.
That was the unhappy end of the judicial process that was
still under way when Melvin L. Wulf wrote his introduction.
He sounded a note of hope because, at that point, he had
had a favorable decision from conservative Federal Judge
Albert V. Bryan, Jr., of Alexandria, Virginia. Judge Bryan
heard the testimony of high CIA officials to the effect that
the 168 passages they wanted to delete were classified — and
in most cases did not believe what they said. He found that
only 27 of the 168 contained material that had been specifi-
cally classified while Marchetti was in the agency. But on
appeal the government swept all that away. The U.S. Court
of Appeals for the Fourth Circuit held that Judge Bryan had
imposed too high a standard on the CIA in demanding
specific proof of classification. It was enough if the item in
question had appeared in a classified document, even an
xvi The CIA and the Cull of Intelligence
entire book stamped SECRET; there was no need to show
that the classifying officer had had the particular matter in
mind. Nor was there any need for the agency to convince the
court that the national security was at risk. CIA officials, the
court said, were entitled to a "presumption of regularity."
In short, the courts simply should not second-guess or
even examine the CIA's reasons for censoring an ex-
employee's words: there will be no meaningful judicial review.
And that leads to a third observation. Judges are evidently
uneasy about mixing in the intelligence business. Only that
can explain the extraordinary deference paid to the CIA in
this and other cases.
Five years after Victor Marchetti, John Marks, and their
publisher were defeated in the courts, the Supreme Court
took an even more radical and dangerous step toward offi-
cial censorship. The case was that of Frank Snepp, who had
been a CIA man in Vietnam and wrote a book. Decent
Interval, about the last days of the American presence there.
Snepp felt that high officials, notably Secretary of State
Kissinger, had made craven and immoral decisions, worst of
all in abandoning thousands of Vietnamese colleagues to
their fate. Mc did not submit his manuscript for clearance, as
he had promised to do in his secrecy agreement, but pub-
lished the book before the agency was aware of his plans.
Too late to get an injunction against Snepp, the Justice
Department asked the courts to make some new and even
more ingenious law, imposing a massive financial penalty on
Snepp for violating his "contract." Summarily — without hear-
ing argument or even allowing Snepp's lawyers to brief the
issue — the Supreme Court imposed a "constructive trust"
on Snepp. requiring him to give the government everything
he earned from his book. That was S140,000, Snepp's sole
income over a period of three years, with nothing deductible
even for his living expenses. (The sum was less, incidentally,
than he would have earned by staying in the CIA and
keeping quiet about the wrongs he had observed.)
In the Marchetti case the lower courts developed the idea
of Secrecy by Contract — the theory that, without congres-
sional authorization, the CIA could make its employees sign
away their constitutional rights for the rest of their lives. In
the Snepp case the Supreme Court seemed to remove even
the requirement of a contract from this theory. It hinted that
anyone in the government who had access to important
Introduction by Anthony Lewis xvii
secrets could be sued for violating his "trust" if he published
something without clearance, whether or Dot he had signed a
secrecy agreement. The Court put it: "Quite apart from the
plain language of the [secrecy] agreement, the nature of
Snepp's duties and his conceded access to confidential sources
and materials could establish a trust relationship." That ap-
proach would in effect give the United States the equivalent
of Britain's notorious Official Secrets Act, which makes it a
crime to disclose any government information — however
innocuous — without official approval.
There was a revealing indication of judicial attitudes in the
Supreme Court's opinion in the Snepp case, a footnote that
read as follows:
Every major nation in the world has an intelligence
service. Whatever fairly may be said about some of its
past activities, the CIA (or its predecessor the OSS) is
an agency thought by every President since Franklin D.
Roosevelt to be essential to the security of the United
States and — in a sense — the free world. It is impossible
for a government wisely to make critical decisions about
foreign policy and national defense without the benefit
of dependable foreign intelligence. Sec generally T.
Powers, The Man Who Kept the Secrets.
The reverential tone of that footnote shows again that the
courts give the CIA a discretion that they would not think
of allowing any other agency of government — not even the
President of the United States, to judge by the Nixon Tapes
Case. The cult of intelligence thrives on the bench. It has
only to be added that the justices evidently did not know
what they were doing when they cited the Thomas Powers
book. It contained large amounts of classified information,
disclosed by various past and present CIA officials when
interviewed by Powers.
The political branches have responded more realistically
than the courts to the problem of preventing the CIA abuses
of power. The process that this book helped to start ended
with permanent House and Senate Intelligence committees
doing a continuing job of scrutiny, and with the Executive
Branch keeping a much more formal check on the agency.
But the legal precedent set by the treatment of The CIA
and the Cult of Intelligence has not become any less danger-
xviii The CIA and the Cull of Intelligence
ous with time. In that sense, the book is a classic piece of
evidence in the endless war for freedom of speech and of the
press. In the old days, in this country, the test of that
freedom was the right of the soapbox orator or the radical
editor to expound his theory of society. Today the issue is
not freedom to propagate ideas but freedom to tell the facts
about government — and freedom of the citizen to acquire
the facts. As government becomes more powerful in our
lives the ability to know what it is doing and hence to control
its power becomes ever more important. We can still hope
that some day a less deferential Supreme Court will apply
that truth to the exercise of secret power, holding even the
Central Intelligence Agency subject to the Constitution, and
will vindicate The CIA and the Cult of Intelligence in law as
it has long since been vindicated in the necessary truths it
told.
PUBLISHER'S NOTE
The CIA and the Cull of Intelligence was first published in
1974. By Federal Court order, the authors were required to
submit the manuscript of this book to the CIA for review
prior to publication. Under the terms of the court ruling, the
CIA ordered the deletion of 339 passages of varying length.
Later, following demands to the CIA by legal counsel for
the authors — and the commencement of litigation by the
publisher and the authors against the CIA challenging the
censorship involved — all but 168 of these deletions were
reinstated. For a full account of these events, see the intro-
duction by Melvin L. Wulf, Legal Director of the American
Civil Liberties Union.
In the past year — under the Freedom of Information Act in
a suit brought by the Center for National Security Studies —
some twenty-five previously deleted passages have been
cleared for publication and appear for the first time in this
edition. A special introduction by Anthony Lewis, noted
columnist and political commentator, chronicles these most
recent developments. As the book goes to press, additional
passages are being declassified and may be included in fu-
ture editions.
As it presently exists, therefore, the manuscript of The CIA
and the Cull of Intelligence demonstrates with remarkable
clarity the actual workings of the CIA's "classification" system.
In this edition, passages the CIA originally ordered excised —
and then reluctantly permitted to be reinstated — are printed
in boldface type. Those passages included for the first time
in the 1980 edition are printed in boldface italic type. Passages
included in this edition for the first time are printed in italic
type. Firm deletions are indicated by blank spaces with the
word DELETED. The number of lines cut is indicated.
AUTHORS' PREFACES
I
My introduction to the intelligence business came during the
early years of the Cold War, while serving with the U.S.
Army in Germany. There, in 1952, I was sent to the Euro-
pean Command's "special" school at Oberammergau to study
Russian and the rudiments of intelligence methods and
techniques. Afterward I was assigned to duty on the East
German border. The information we collected on the enemy's
plans and activities was of little significance, but the duty
was good, sometimes even exciting. We believed that we
were keeping the world free for democracy, that we were in
the first line of defense against the spread of communism.
After leaving the military service, I returned to college at
Penn State, where I majored in Soviet studies and history.
Shortly before graduation, I was secretly recruited by the
CIA, which I officially joined in September 1955; the struggle
between democracy and communism seemed more impor-
tant than ever, the CIA was in the forefront of that vital
international battle. I wanted to contribute.
Except for one year with the Clandestine Services, spent
largely in training, most of my career with the CIA was
devoted to analytical work. As a Soviet military specialist, I
did research, then current intelligence, and Anally national
estimates — at the time, the highest form of intelligence
production. I was at one point the CIA's — and probably the
U.S. government's — leading expert on Soviet military aid to
the countries of the Third World. I was involved in uncover-
ing Moscow's furtive efforts that culminated in the Cuban
missile crisis of 1962 and. later, in unraveling the enigma of
the "Soviet ABM problem."
From 1966 to 1969 1 served as a staff officer in the Office of
the Director of the CIA. where I held such positions as
special assistant to the Chief of Planning. Programming, and
Budgeting, special assistant to the Executive Director, and
executive assistant to the Deputy Director. It was during these
years that I came to see how the highly compartmentalized
Authors' Prefaces
xxi
organization performed as a whole, and what its full role in
the U.S. intelligence community was. The view from the
Office of the Director was both enlightening and discouraging.
The CIA did not, as advertised to the public and the Congress,
function primarily as a central clearinghouse and producer of
national intelligence for the government. Its basic mission
was that of clandestine operations, particularly covert action —
the secret intervention in the internal affairs of other nations.
Nor was the Director of CIA a dominant— or much in-
terested — figure in the direction and management of the
intelligence community which he supposedly headed. Rather,
his chief concern, like that of most of his predecessors and
the agency's current Director, was in overseeing the CIA's
clandestine activities.
Disenchanted and disagreeing with many of the agency's
policies and practices, and, for that matter, with those of the
intelligence community and the U.S. government, I resigned
from the CIA in late 1969. But having been thoroughly indoc-
trinated with the theology of "national security" for so many
years, I was unable at first to speak out publicly. And, I
must admit, I was still imbued with the mystique of the
agency and the intelligence business in general, even retain-
ing a certain affection for both. I therefore sought to put
forth my thoughts — perhaps more accurately, my feelings — in
fictional form. I wrote a novel. The Rope-Dancer, in which I
tried to describe for the reader what life was actually like in
a secret agency such as the CIA, and what the differences
were between myth and reality in this overly romanticized
profession.
The publication of the novel accomplished two things. It
brought me in touch with numerous people outside the inbred,
insulated world of intelligence who were concerned over the
constantly increasing size and role of intelligence in our
government. And this, in turn, convinced me to work toward
bringing about an open review and, I hoped, some reform
in the U.S. intelligence system. Realizing that the CIA
and the intelligence community are incapable of reform-
ing themselves, and that Presidents, who see the system as a
private asset, have no desire to change it in any basic way, I
hoped to win support for a comprehensive review in Congress.
I soon learned, however, that those members of Congress
who possessed the power to institute reforms had no interest
in doing so. The others either lacked the wherewithal to
xxii The CIA and the Cult of Inielligence
accomplish any significant changes or were apathetic. I there-
fore decided to write a book — this book — expressing my
views on the CIA and explaining the reasons why I believe
the time has come for the U.S. intelligence community to be
reviewed and reformed.
The CIA and the government have fought long and hard —
and not always ethically — first to discourage the writing of
this book and then to prevent its publication. They have
managed, through legal technicalities and by raising the spec-
ter of "national security" violations, to achieve an unprece-
dented abridgment of my constitutional right to free speech.
They have secured an unwarranted and outrageous permaneni
injunction against me. requiring that anything I write or say,
"factual, fictional or otherwise," on the subject of intelli-
gence must First be censored by the CIA. Under risk of
criminal contempt of court, I can speak only at my own peril
and must allow the CIA thirty days to review, and excise,
my writings — prior to submitting them to a publisher for
consideration.
It has been said that among the dangers faced by a demo-
cratic society in fighting totalitarian systems, such as fascism
and communism, is that the democratic government runs the
risk of imitating its enemies' methods and, thereby, destroy-
ing the very democracy that it is seeking to defend. I cannot
help wondering if my government is more concerned with
defending our democratic system or more intent upon imitat-
ing the methods of totalitarian regimes in order to maintain
its already inordinate power over the American people.
VICTOR MARCHETTI
Oakton, Virginia
February 1974
II
Unlike Victor Marcheiii, I did not join the government to
do intelligence work. Rather, fresh out of college in 1966, I
entered the Foreign Service. My first assignment was to have
been London, but with my draft board pressing for my
services, the State Department advised me that the best way
to stay out of uniform was to go to Vietnam as a civilian
Authors' Prefaces
xxiii
advisor in the so-called pacification program. I reluctantly
agreed and spent the next eighteen months there, returning
to Washington just after the Tet offensive in February 1968.
From personal observation, I knew that American policy in
Vietnam was ineffective, but I had been one of those who
thought that if only better tactics were used the United
States could "win." Once back in this country, I soon came
to see that American involvement in Indochina was not only
ineffective but totally wrong.
l~he State Department had assigned me to the Bureau of
Intelligence and Research, first as an analyst of French and
Belgian affairs and then as staff assistant to State's intelli-
gence director. Since this bureau carries on State's liaison
with the rest of the intelligence community, I was for the
first time introduced to the whole worldwide network of
American spying — not so much as a participant but as a
shuffler of top-secret papers and a note-taker at top-level
intelligence meetings. Here I found the same kind of waste
and inefficiency I had come to know in Vietnam and, even
worse, the same sort of reasoning that had led the country
into Vietnam in the first place. In the high councils of the
intelligence community, there was no sense that intervention
in the internal affairs of other countries was not the inherent
right of the United States. "Don't be an idealist; you have to
live in the 'real' world," said the professionals. I found it
increasingly difficult to agree.
For me, the last straw was the American invasion of
Cambodia in April 1970. I felt personally concerned because
only two months earlier, on temporary assignment to a White
House study group, I had helped write a relatively pessimis-
tic report about the situation in Vietnam. It seemed now
that our honest conclusions about the tenuous position of
the Thieu government had been used in some small way to
justify the overt expansion of the war into a new country.
I wish now that I had walked out of the State Department
the day the troops went into Cambodia. Within a few months,
however, I found a new job as executive assistant to Senator
Clifford Case of New Jersey. Knowing of the Senator's oppo-
sition to the war, I looked at my new work as a chance to try
to change what I knew was wrong in the way the United
States conducts its foreign policy.
During my three years with Senator Case, when we were
concentrating our efforts on legislation to end the war, to
xxiv The CIA and the Cull of Intelligence
limit the intelligence community, and to curb presidential
abuses of executive agreements, I came to know Victor
Marchetti. With our common experience and interest in
intelligence, we talked frequently about how things could be
improved. In the fall of 1972. obviously disturbed by the legal
action the government had taken against the book he in-
tended to write but which he had not yet started, he felt he
needed someone to assist him in his work. Best of all would
be a coauthor with the background to make a substantive
contribution as well as to help in the actual writing. This
book is the result of our joint effort.
I entered the project in the hope that what we have to say
will have some effect in influencing the public and the Con-
gress to institute meaningful control over American intelli-
gence and to end the type of intervention abroad which, in
addition to being counterproductive, is inconsistent with the
ideals by which our country is supposed to govern itself.
Whether such a hope was misguided remains to be seen.
JOHN D. MARKS
Washington, D.C.
February 1974
ACKNOWLEDGMENTS
Work on The CIA and the Cull of Intelligence began in early
1972 and from the beginning the effort was plagued with
problems, largely generated by an angry CIA and a mis-
guided U.S. government. Throughout the ordeal, our friend
and agent, David Obst, was a constant source of encourage-
ment and help. Similarly, the good people at the American
Civil Liberties Union — Aryeh Neier, Sandy Rosen, John
Shattuck, Mimi Schneider, and others, but especially Mel
Wulf — provided more than free counsel and an effective
legal defense of our constitutional rights. TTiey have been
friends of the best sort. We owe a special debt of gratitude
to our editor, Dan Okrent, and to Tony Schulte of Knopf,
who never lost faith and always offered inspiration. To the
president of Random House, RobCTt Bernstein, who had the
courage to go forward with the book in the face of intimidat-
ing odds, we are deeply indebted. And. lastly, to Jim Boyd
of the Fund for Investigative Journalism and all the others
who helped in various ways but must in the circumstances
remain anonymous, we say thank you.
V M. and J D M
Introduction
by Melvin L. Wulf
Legal Director
American Civil Liberties Union
On April 18, 1972, Victor Marchetti became the first Ameri-
can writer to be served with an official censorship order
issued by a court of the United States. The order prohibited
him from "disclosing in any manner (1) any information
relating to intelligence activities. (2) any information con-
cerning intelligence sources and methods, or (3) any intelli-
gence information. ■■
To secure the order, government lawyers had appeared in
the chambers of Judge Albert V. Bryan, Jr., of the United
States District Court for the Eastern District of Virginia, in
Alexandria, on the morning of April 18, without having
notified Marchetti. The government's papers recited that
Marchetti had worked at the CIA from 1955 to 1969, that he
had signed several "secrecy agreements" in which he had
agreed not to reveal any information learned during his
employment, that after he left the CIA he had revealed
forbidden information, that he was planning to write a non-
fiction book about the agency, and that publication of the
book would "result in grave and irreparable injury to the
interests of the United States."
Among the papers presented to the judge was an affidavit
(classified "Secret") from TTiomas H. Karamessines, Deputy
Director of the Central Intelligence Agency, the head of the
CIA's covert-activities branch. The affidavit said that a maga-
zine article and an outline of a proposed book, both written
by Marchetti, had been turned over to the CIA and that
they contained information about the CIA's secret activities.
The affidavit related several of the items and described how
their disclosure would, in the CIA's opinion, be harmful to
the United States. On the basis of that affidavit and others,
including one by CIA Director Richard Helms, Judge Bryan
signed a temporary restraining order forbidding Marchetti to
disclose any information about the CIA and requiring him to
Introduction by Melvin L. Wulf xxvii
submit any "manuscript, article or essay, or other writing,
factual or otherwise," to the CIA before "releasing it to any
person or corporation." It was that order which United
States marshals served upon Marchetti. 7~he next month was
consumed by a hectic and unsuccessful effort to have the
order set aside.
Marchetti asked the ACLU for assistance the day after
receiving the order, and was in New York the following day
to meet his lawyers and prepare his defense. At the first
court appearance, on Friday, April 21, we unsuccessfully
urged Judge Bryan to dissolve the temporary restraining
order. He also refused to order the government to allow
Marchetti's lawyers to read the "secret" affidavit, because
none of us had security clearance. The following Monday we
were in Baltimore to arrange an appeal to the United States
Court of Appeals to argue there that the temporary restrain-
ing order should be dissolved. Hie court agreed to hear
argument two days later. During the Baltimore meeting the
government lawyers announced that they had conferred secur-
ity clearance upon me and that I would be able to read the
secret affidavit but could not have a copy of it. They said
they would clear the other defense lawyers during the next
few days. We were also told that any witnesses we intended
to present at trial, to be held that Friday, would also require
security clearance before we could discuss the secret affida-
vit with them. That was a hell of a way to prepare for trial;
we couldn't even talk to prospective witnesses unless they
were approved by the government.
We argued the appeal before the Court of Appeals on
Wednesday, but that too was unsuccessful, and the tempo-
rary restraining order remained in effect. Our only satisfac-
tion was an order by the court prohibiting both the CIA and
the Department of Justice from trying to influence our
witnesses in any way.
On Friday we appeared before Judge Bryan and reluc-
tantly asked for a two-week postponement because it had
been impossible for us to secure witnesses who could testify
that day. The need for security clearance had made it impos-
sible for us to discuss the case with those witnesses who had
at least tentatively agreed to testify for the defense. But,
more depressing, we had had great difficulty finding people
willing to testify at all. We had called a few dozen prospects,
largely former members of the Kennedy and Johnson admin-
xxviii The CIA and the Cull of Intelligence
istrations who had reputations as liberals and even, in some
cases, reputations as civil-libertarians. I'm still waiting for
half of them to return my calls. Of the other half, most were
simply frightened at the idea of being identified with the
case, and some, including a few who had themselves re-
vealed classified information in their published memoirs,
agreed with the government that Marchetti's pen should be
immobilized. In the end, our list of witnesses was short but
notable: Professor Abram Chayes of Harvard Law School,
and former Legal Advisor to the Department of State in the
Kennedy administration: Professor Richard Falk, Milbank
Professor of Intem:itional Law at Princeton; Morton Halperin,
former Deputy Assistant Secretary of Defense and staff mem-
ber of the National Security Council under Kissinger; and
Professor Paul Blackstock, an intelligence expert from the
University of South Carolina.
The next two weeks were consumed by the frustrating
hunt for witnesses and by other pre-trial requirements, in-
cluding examination of Karamessines and the CIA's Security
Director, who were to be the government's chief witnesses.
The trial started and ended on May IS. Essentially, it
consisted of Karamessines repeating the contents of his se-
cret affidavit. As interesting as it would be to describe the
day in detail. I am forbidden to, for the public was excluded
and the testimony of the government witnesiies is classiFied.
The result, however, is public. It was a clean sweep for the
CIA, and Judge Bryan issued a permanent injunction against
Marchetti.
The results on appeal were not much better. The validity
of the injunction was broadly afflrmed. The only limitation
imposed by the Court of Appeals was that only classified
information could be deleted from the book by the CIA.
The litigation finally came to an end in December 1972 when
the Supreme Court refused to hear the case. It was a great
defeat for Marchetti, for his lawyers — and for the First
Amendment.
American law has always recognized that injunctions against
publication — "prior restraints," in legal jargon — threaten the
root and branch of democratic society. Until 1971 , when the
New York Times was enjoined from printing the Pentagon
Papers, the federal government had never attempted to im-
pose a prior restraint on publication, and the handful of such
Introduction by Melvin L. Wulf xxix
efforts by the states were uniformly denounced by the Su-
preme Court. As we learned from the Pentagon Papers
Case, however, the Nixon administration was not going to
be deterred by a mere two hundred years of history from
becoming the first administration to try to suppress publica-
tion of a newspaper. They ultimately failed in their specific
goal of suppressing publication of a newspaper — but, for
fifteen days, a newspaper actually was restrained from
publishing, the first such restraint in American history.
The Times' resumption of publication of the Pentagon
Papers immediately after the Supreme Court decision would
seem to mean that the case ended victoriously. Although it
was a victory, it was not a sound victory, for only Justices
Black and Douglas said that injunctions against publication
were constitutionally forbidden under any circumstances. The
other members of the court made it perfectly clear that they
could imagine circumstances where such injunctions would
be enforced, notwithstanding the First Amendment's guaran-
tee of a free press. Nixon-administration lawyers could read
the opinions as well as ACLU lawyers, and they too saw that
the decision in the Pentagon Papers Case was not a knock-
out punch. So only ten months after being beaten off by the
New York Times, they were back in court trying the same
thing again with Victor Marchetti.
Nine opinions were written in the Pentagon Papers Case.
Out of all those opinions one standard emerge under which
a majority of the Justices would have allowed information to
be suppressed prior to publication: proof by the government
that disclosure would "surely result in direct, immediate and
irreparable injury to the Nation or its people." We were
comfortable with that standard because we were confident
that nothing Marchetti had disclosed or would disclose in the
future would have that effect. But we were not permitted to
put the government to its proof through the testimony of our
four witnesses because Judge Bryan agreed with the govern-
ment that Marchetti's case was different from the Pentagon
Papers Case. "We are not enjoining the press in this case,"
the government lawyers said. "We are merely enforcing a
contract between Marchetti and the CIA. This is not a First
Amendment case, it's just a contract action." The contract
to which they were referring was, of cowse, Marchetti's
secrecy agreement.
All employees of the CIA are required to sign an agree-
XXX
The CIA and the Cult of Intelligence
ment in which they promise not to reveal any information
learned during their employment which relates to "intelligence
sources or methods" without first securing authorization from
the agency. The standard form of the agreement includes
threats of prosecution and promises to deliver the most
awful consequences upon the slightest violation. The only
trouble with the threats is that until now they have been
unenforceable. Apart from disclosure of information classi-
fied by the Atomic Energy Commission, it is not a crime to
disclose classified information unless it is done under circum-
stances which involve what is commonly understood as
espionage — spying for a foreign nation. The government
tried, in the prosecution of Daniel Ellsberg, to stretch the
espionage statutes to punish his disclosure of the Pentagon
Papers, even though he had had no intent to injure the
United States, as required by the statute. Though that prose-
cution was aborted under the most dramatic circumstances,
including a surreptitious attempt by President Nixon to influ-
ence the trial judge, it is unlikely that the appeals courts
would have upheld such an expansive application of the
espionage laws — assuming that the jury would even have
brought in a guilty verdict.
In any case, being doubtful about how far the threat of
prosecution under a dubious statute would deter Marchetti
from publicly criticizing the CIA and inevitably disclosing
some of its practices, the CIA fell u|x>n the contract theory
as a device for trying to suppress his book before it was put
into print. The theory struck a harmonious note with 'the
federal judges who heard the case, and proved more success-
ful than the government probably ever dared to hope and
certainly more than we had ever expected. But it cheapens
the First Amendment to say that an agreement by an em-
ployee of the United States not to reveal some government
activity is the same as an agreement to deliver a hundred
bales of cotton. It ignores the compelling democratic princi-
ple that the public has a right to be well informed about its
government's actions.
Of course, some will be heard to say, "But these are
secrets," and indeed much of the information you will read
in this book has been considered to be secret. But "secrets"
have been revealed before — there were literally thousands of
them in the Pentagon Papers. Every high government offi-
cial who writes his memoirs after leaving office reveals
Introduction by Melvin L. Wtilf xxxi
"secrets" he learned while in government service, and most
had signed secrecy agreements too. "Secrets" are regularly
leaked to the press by government officers, sometimes to
serve official policy, sometimes only to serve a man's own
ambitions. In fact, disclosure of so-called secrets — even CIA
secrets — has a long and honorable history in our country,
and the practice ha.s proved to be valuable because it pro-
vides the public with important information that it must have
in order to pass judgment on its elected officials.
Furthermore, disclosure of "secret" information is rarely
harmful because the decision inside government to classify
information is notoriously frivolous. Experts have estimated
that up to 99 percent of the millions of documents currently
classified ought not be classified at all. But nut only is
disclosure of "secret" information generally harmless, it is a
tonic that improves our nation's health. Government officers
cried that disclosure of the Pentagon Papers would put the
nation's security in immediate jeopardy. When they were
finally published in their entirety, the only damage was to
the reputation of officials in the Kennedy and Johnson ad-
ministrations who were shown to have deceived the nation
about the war in Vietnam.
When you read this book, you will notice that, unlike any
other book previously published in the United States, this
one contains blanks. That is the remarkable effect of the
government's success. You will also notice that the book has
two authors, Victor Marchetti and John Marks. That is
another remarkable effect of the government's success. Af-
ter being enjoined, defeated in his attempts to win relief in
the appellate courts, virtually ignored by the press, shunned
by his former colleagues at the CIA, unable even to discuss
the progress of his work with his editor at Knopf (because
the very purpose of the injunction was to forbid the pub-
lisher to see the manuscript before the CIA had had the
opportunity to censor it), there was serious question whether
Marchetti would be able to write the book at all. His discour-
agement was profound and his bitterness sharp. If he had
not written the book, the government's success would have
been complete, for that was its real objective. Luckily,
Marchetti and Marks came together, and with a shared
perspective on the evils of clandestine activities, they were
xxxii The CIA and the Cult of Intelligence
able to do together what the government hoped would not
be done at all.
When the manuscript was completed at the end of August
1973, it was delivered to the CIA. Thirty days later, the time
allowed by the injunction, we received a letter from the CIA
which designated 339 portions of the book that were to be
deleted. Some of the deletions were single words, some were
several lines, some were portions of organizational charts,
and many were whole pages. In all, 15 to 20 percent of the
manuscript was ordered deleted. I won't soon forget that
September evening when Marchetti, Marks, and I sat in the
ACLU office for several hours literally cutting out the de-
leted parts of the manuscript so that we could deliver the
remains to Knopf. It was the Devil's work we did that day.
We filed suit in October, together with Knopf, challenging
the CIA's censorship. By the time we went to trial on
February 28, the agency had reduced the number of dele-
tions from 339 to 168. Withdrawal of half their original objec-
tions should not be taken as a sign of the CIA's generosity.
On the contrary, it was the result of our insistent demands
over a period of four months, and the agency's recognition
that we would go to the mat over the very last censored
word. The authors gave up nothing, and rejected several
invitations to re-write parts of the book so that it would be
satisfactory to the CIA.
There were three issues to be decided at the trial: did the
censored portions of the book consist of classiflcd information?
Was that information learned by the authors during their
government employment? And was any of it in the public
domain?
After a two-and-a-half-day trial, including testimony by
the five highest-ranking officials of the CIA, Judge Bryan
decided the case on March 29. It was a major victory for the
authors and the publisher. Bryan held that the agency had
failed, with a few exceptions, to prove that the deleted
information was classified.
The decision was probably more surprising to the CIA.
Accustomed as they have become to having their way, it is
unlikely to have occurred to them that a mere judge of the
United States would contradict their declarations about clas-
sified information, for it was the government's theory through-
out the case that material was classified if high-ranking officials
said it was classified. Our view, presented through the ex-
Introduction by Melvin L. Wulf
xxxiii
pert testimony of Morton Halperin, was that concrete proof
of classification was required. In the absence of documents
declaring specific information to be classified, or testimony
by the employee who had in fact clas.siFied specific information.
Judge Bryan flatly rejected mere assertions by ranking CIA
officers that such information was classified.
Of the 168 disputed items, he found only 27 which he could
say were classified. On the other hand, he found that only
seven of the 168 had been learned by Marchetti and Marks
outside their government employment, and that none of the
information was in public domain.
The decision is obviously important. It allows virtually the
entire book to be published (though the present edition still
lacks the deleted sections cleared by Judge Bryan, since he
postponed enforcement of his decision to allow the goverment
its right to appeal); it desanctifies the CIA; and it discards
the magical authority that has always accompanied govern-
ment incantation of "national security." Hopefully, the higher
courts will agree.
There will necessarily be differences of opinion on the sub-
ject of the disclosure of secret information. The reader of
this book can decide whether the release of the information
it contains serves the public's interest or injures the nation's
security. For myself, I have no doubts. Both individual citi-
zens and the nation as a whole will be far better off for the
book's having been published. The only injury inflicted in
the course of the struggle to publish the book is the damage
sustained by the First Amendment.
PART I
1.
THE CULT OF INTELLIGENCE
But ihis secrecy . . . has become a god in this
country, and those people who have secrets travel
in a kind of fralernity . . . and they will not speak
to anyone else.
— StNATOR I WILLIAM FULBRIOHT
Chairman. Senate Foreign
Relations Committee
November 1971
There exists in our nation today a powerful and dangerous
secret cult — the cult of intelligence.
Its holy men are the clandestine professionals of the Cen-
tral Intelligence Agency. Its patrons and protectors are the
highest officials of the federal government. Its membership
extending far beyond government circles, reaches into the
power centers of industry, commerce, finance, and labor,
Its friends are many in the areas of important public
influence — the academic world and the communications media.
The cult of intelligence is a secret fraternity of the American
political aristocracy.
The purpose of the cult is to further the foreign policies of
the U.S. government by covert and usually illegal means,
while at the same time containing the spread of its avowed
enemy, communism. Traditionally, the cult's hope has been
to foster a world order in which America would reign supreme,
the unchallenged international leader. Today, however, that
dream stands tarnished by time and frequent failures. Thus,
the cult's objectives are now less grandiose, but no less
disturbing. It seeks largely to advance America's self-appointed
role as the dominant arbiter of social, economic, and politi-
cal change in the awakening regions of Asia, Africa, and
Latin America. And its worldwide war against communism
has to some extent been reduced to a covert struggle to
maintain a self-serving stability in the Third World, using
4
The CIA and the Cull of Intelligence
whatever clandestine methods are available. For the cult of
intelligence, fostering "stability" may in one country mean
reluctant and passive acquiescence to evolutionary change;
in another country, the active maintenance of the status quo;
in yet another, a determined effort to revene popular trends
toward independence and democracy. The cult attempts that
which it believes it can accomplish and which — in the event
of failure or exposure — the U.S. government can plausibly
deny.
The CIA is both the center and the primary instrument of
the cult of intelligence. It engages in espionage and counter-
espionage, in propaganda and disinformation (the deliberate
circulation of false information), in psychological warfare
and paramilitary activities. It penetrates and manipulates pri-
vate institutions, and creates its own organizations (called
"proprietaries") when necessary. It recruits agents and
mercenaries; it bribes and blackmails foreign officials to
carry out its most unsavory tasks. It does whatever is re-
quired to achieve its goals, without any consideration of the
ethics involved or the moral consequences of its actions. As
the secret-action arm of American foreign policy, the CIA's
most potent weapon is its covert intervention in the internal
affairs of countries the U.S. government wishes to control or
influence.
Romanticized by myths, the operations of the CIA are
also beclouded by false images and shielded by official
deceptions. Its practices are hidden behind arcane and anti-
quated legalisms which prevent the public and even Con-
gress from knowing what the mysterious agency is doing — or
why. This the cult of intelligence justifies with dramatic
assertions that the CIA's purpose is to preserve the "national
security," that its actions are in response to the needs of the
nation's defense. No one — in an age in which secrecy is the
definitional operative of security — need know more than
that.
The cult is intent upon conducting the foreign affairs of
the U.S. government without the awareness or participation
of the people. It recognizes no role for a questioning legisla-
ture or an investigative press. Its adherents believe that only
they have the right and the obligation to decide what is
necessary to satisfy the national needs. Although it pursues
outmoded international [xilicies and unattainable ends, the
cult of intelligence demands that it not be held accountable
The Cull of Intelligence
5
for its actions by the people it professes to serve. It is a
privileged, as well as secret, charge. In their minds, those
who belong to the cult of intelligence have been ordained,
and their service is immune from public scrutiny.
The "clandestine mentality" is a mind-set that thrives on
secrecy and deception. It encourages professional amorality —
the belief that righteous goals can be achieved through the
use of unprincipled and normally unacceptable means. Thus,
the cult's leaders must tenaciously guard their official actions
from public view. To do otherwise would restrict their ability
to act independently; it would permit the American people
to pass judgment on not only the utility of their policies, but
the ethics of those policies as well. With the cooperation of
an acquiescent, ill-informed Congress, and the encourage-
ment and assistance of a series of Presidents, the cult has
built a wall of laws and executive orders around the CIA and
itself, a wall that has blocked effective public scrutiny.
When necessary, the members of the cult of intelligence,
including our Presidents (who are always aware of, generally
approve of, and often actually initiate the CIA's major
undertakings), have lied to protect the CIA and to hide their
own responsibility for its operations. The Eisenhower admin-
istration lied to the American people about the CIA's in-
volvement in the Guatemalan coup d'itat in 1954, about the
agency's support of the unsuccessful rebellion in Indonesia
in 1958, and about Francis Gary Powers' 1960 U-2 mission.
The Kennedy administration lied about the CIA's role in the
abortive invasion of Cuba in 1%1, admitting its involvement
only after the operation had failed disastrously. The Johnson
administration lied about the extent of most U.S. govern-
ment commitments in Vietnam and Laos, and all of the
CIA's. And the Nixon administration publicly lied about the
agency's attempt to fix the Chilean election in 1970. For
adherents to the cult of intelligence, hypocrisy and deception,
like secrecy, have become standard techniques for prevent-
ing public awareness of the CIA's clandestine operations,
and governmental accountability for them. And these men
who ask that they be regarded as honorable men, true
patriots, will, when caught in their own webs of deceit, even
assert that the government has an inherent right to lie to
its people.
6
The CIA and the Cult of Intelligence
The justification for the "right to lie" is that secrecy in
covert operations is necessary to prevent U.S. policies and
actions from coming to the attention of the "enemy" — or, in
the parlance of the clandestine trade, the "opposition." If
the opposition is oblivious to the CIA's operations, the
argument runs, then it cannot respond and the CIA activities
stand a good chance of succeeding. Nonetheless, in many
instances the opposition knows exactly what covert opera-
tions are being targeted against it, and it takes counteraction
when possible. The U-2 overflights and, later, those of the
photographic satellites were, and are, as well known to the
Soviets and the Chinese as Soviet overhead reconnaissance
of the United States is to the CIA: there is no way, when
engaging in operations of this magnitude, to keep them
secret from the opp)osition. It, too. employs a professional
intelligence service. In fact, from 1952 to 1964, at the height of
the Cold War, the Soviet KGB electronically intercepted
even the most secret messages routed through the code
room of the U.S. embassy in Moscow. This breach in secrecy,
however, apparently caused little damage to U.S. national
security, nor did the Soviet government collapse because the
CIA had for years secretly intercepted the private conversa-
tions of the top Russian leaders as they talked over their
limousine radio-telephones. Both sides knew more than
enough to cancel out the effect of any leaks. The fact is that
in this country, secrecy and deception in intelligence opera-
tions are as much to keep the Congress and the public from
learning what their government is doing as to shield these
activities from the opposition. The intelligence establishment
operates as it does to maintain freedom of action and avoid
accountability.
A good part of the CIA's power position is dependent upon
its careful mythologizing and glorification of the exploits of
the clandestine profession. Sometimes this even entails fos-
tering a sort of perverse public admiration for the covert
practices of the opposition intelligence services — to frighten
the public and thereby justify the actions of the CIA. What-
ever the method, the selling of the intelligence business is
designed to have us admire it as some sort of mysterious,
often magical profession capable of accomplishing terribly
difficult, if not miraculous, deeds. Like most myths, the
intrigues and successes of the CIA over the years have been
The Cult of Intelligence
7
more imaginary than real. What is real, unfortunately, is the
willingness of both the public and adherents of the cult to
believe the fictions that permeate the intelligence business.
The original mission of the CIA was to coordinate the
intelligence-collection programs of the various governmental
departments and agencies, and to produce the reports and
studies required by the national leadership in conducting the
affairs of U.S. foreign policy. This was President Truman's
view when he requested that Congress establish the secret
intelligence agency by passing the National Security Act of
1947. But General William "Wild Bill" Donovan, Allen Dulles,
and other veterans of the wartime Office of Strategic
Services — a virtually unregulated body, both romantic and
daring, tailor-made to the fondest dreams of the covert
operator — thought differently. TTiey saw the emergency agency
as the clandestine instrument by which Washington could
achieve foreign-policy goals not attainable through diplomacy.
TTiey believed thai the mantle of world leadership had been
passed by the British to the Americans, and that their own
secret service must take up where the British left off. Thus,
they lobbied Congress for the power to conduct covert
operations.
That Truman attempted to create an overt intelligence
organization, one which would emphasize the gathering and
analysis of information rather than secret operations, was
commendable. That he thought he could control the advo-
cates of coven action was, in retrospect, a gross miscalculation.
Congress, in an atmosphere of Cold War tension, allowed
itself to be persuaded by the intelligence professionals. With
the passage of the National Security Act of 1947 it allowed
the new agency special exemptions from the normal congres-
sional reviewing process, and these exemptions were ex-
panded two years later by the Central Intelligence Agency
Act of 1949. Of the greatest and most far-reaching conse-
quence was the provision in the 1947 law that permitted the
ClA to "perform such other functions and duties related to
intelligence ... as the National Security Council may from
time to time direct." From those few innocuous words the
CIA has been able, over the years, to develop a secret
charter based on NSC directives and presidential executive
orders, a charter almost completely at variance with the
apparent intent of the law that established the agency. This
vague phrase has provided the CIA with freedom to engage
8 The CIA and the Cult of Intelligence
in covert action, the right to intervene secretly in the inter-
nal affairs of other nations. It has done so usually with the
express approval of the White House, but almost always
without the consent of Congress, and virtually never with
the knowledge of the American public.
Knowing nothing has meant that the public does not even
realize how frequently the CIA has failed. In the field of
classical espionage, the CI A"s Clandestine Services have been
singularly unsuccessful in their attempts to penetrate or spy
on the major targets. The Penkovsky case in the early 1960s,
the only espionage operation against the Soviets that the
agency can point to with pride, with a fortuitous windfall
which British Intelligence made possible for the CIA. The
loudly heralded Berlin tunnel operation of the mid-1950s —
actually a huge telephone wiretap — produced literally tons
of trivia and gossip, but provided little in the way of high-
grade secret information that could be used by the agency's
intelligence analysts. The operation's true value was the
embarrassment it caused the KGB and the favorable public-
ity it generated for the CIA. Against China, there have been
no agent-related espionage successes whatever.
Fortunately for the United States, however, the CIA's
technical experts, working with their counterparts in the
Pentagon and in the private sector, have been able over the
years to develop a wide array of electronic methods for
collecting much useful information on the U.S.S.R. and
China. From these collection systems, supplemented by ma-
terial accumulated through diplomatic channels and open
sources (newspapers, magazines, and so on), the analysts in
the CIA and elsewhere in the intelligence community have
been able to keep abreast of developments within the com-
munist powers.
TTie CIA's Clandestine Services have fared better in the
area of counterespionage than in classical espionage. But
here, too, the gains have been largely fortuitous. Most of the
successes were not scored by spies, but secured through the
good offices of defectors who, in return for safety, provided
whatever information they possessed. And one must sub-
tract from even these limited achievements the misinforma-
tion passed on by "deceptions" — double agents sent out or
"surfaced" by the opposition to defect to, and confuse, the
CIA.
The Cull of Intelligence
9
In its favorite field of operational endeavor, covert action,
the agency has enjoyed its greatest degree of success, but its
blunders and failures have caused much embarrassment to
the United States. Clearly, the CIA played a key role in
keeping Western Europe free of communism in the early
Cold War period, although it sadly erred in its attempts to
roll back the Iron and Bamboo curtains in the late 1940s and
in the 1950s. And it did perform successfully, if questionably,
in the effort to contain the spread of communism elsewhere
in the world. Some of its "victories," however, have since
come back to haunt the U.S. government. One cannot help
but wonder now if it might not have been wiser for the CIA
not to have intervened in Guatemala or Cuba or Chile, not
to have played its clandestine role in Iran or elsewhere in the
Middle East, not to have become so deeply involved in the
affairs of Southeast Asia, particularly Indochina. But the
agency did, and our nation will -have to live with the conse-
quences of those actions.
When its clandestine activities are criticized, the CIA's
leadership often points with disingenuous pride to the work
of the intelligence analysts. But here, too, the agency's rec-
ord is spotty. Its many errors in estimating Soviet and
Chinese strategic military capabilities and intentions have
been a constant source of aggravation to government officials.
Often, however, it has accurately judged the dangers and
consequences of U.S. involvement in the Third World, espe-
cially Southeast Asia and Latin America. Ironically, the
clandestine operatives who control the agency rely little on
the views of the analysts within their own organization, and
the White House staff functionaries tend to be equally heed-
less of the analysts' warnings. And since the CIA's secret
intelligence is largely retained within the executive branch,
there is of course no opportunity for Congress or others to
use these warnings to question the policies of the administra-
tion and the covert practices of the CIA.
Occasionally, clandestine operations backfire spectacularly
in public — the U-2 shootdown and the Bay of Pigs invasion,
for example — and, further, investigations by journalists and
uncowed members of Congress have in these instances given
the public some idea of what the CIA actually does. Most
recently, investigation of the Watergate scandal has revealed
some of the CIA's covert activities within the United .States,
providing a frightening view of the methods which the agency
10
The CIA and the Cull of I nielli gence
has employed for years overseas. The assistance given the
White House "plumbers" by the CIA and the attempts to
involve the agency in the cover-up have pointed up the
dangers posed to American democracy by an inadequately
controlled secret intelligence organization. As the opportuni-
ties for covert action abroad dwindle and are thwarted,
those with careers based in clandestine methods are increas-
ingly tempted to turn their talents inward against the citizens
of the very nation they profess to serve. Nurtured in the
adversary setting of the Cold War. shielded by secrecy, and
spurred on by patriotism that views dissent as a threat to the
national security, the clandestine operatives of the CIA have
the capability, the resources, the experience — and the
inclination — to ply their skills increasingly on the domestic
scene.
There can be no doubt that the gathering of intelligence is a
necessary function of modern government. It makes a signifi-
cant contribution to national security, and it is vital to the
conduct of foreign affairs. Without an effective program to
collect information and to analyze the capabilities and possi-
ble intentions of other major powers, the United States
could neither have confidently negotiated nor could now
abide by the S.A.L.T. agreements or achieve any measure
of true diienie with its international rivals. The proven bene-
fits of intelligence are not in question. Rather, it is the illegal
and unethical clandestine operations carried out under the
guise of intelligence and the dubious purposes to which they
are often put by our government that are questionable —
both on moral grounds and in terms of practical benefit to
the nation.
The issue at hand is a simple one of purpose. Should the
CIA function in the way it was originally intended to — as a
coordinating agency responsible for gathering, evaluating,
and preparing foreign intelligence of use to governmental
policy-makers — or should it be permitted to function as it
has done over the years — as an operational arm, a secret
instrument of the Presidency and a handful of powerful men,
wholly independent of public accountability, whose chief
purpose is interference in the domestic affairs of other na-
tions (and perhaps our own) by means of penetration agents,
propaganda, covert paramilitary interventions, and an array
of other dirty tricks?
The Cull of Intelligence
II
The aim of this book is to provide the American people
with the inside information which they need — and to which
they without question have the right — to understand the
signiflcance of this issue and the importance of dealing with
it.
2.
THE CLANDESTINE THEORY
For some lime 1 have been disturbed by the way
CIA has been diverted from its original assignment.
It has become an operational arm and at limes a
policy-making arm of the Government.
— PRh.SlDENT HARRY 5 THLMAN
December 1%3
/ don't see why ive need in stand by and watch a country go
Communist due to the irresponsibility of its own people.
Henry Kissinger made that statement not in public, but at a
secret White House meeting on June 27, 197U. The country
he was referring to was Chile.
In his capacity as Assistant to the President for National
Security Affairs, Kissinger was chairman of a meeting of the
so-called 40 Committee, an interdepartmental panel responsi-
ble for overseeing the CIA's high-risk covert-action operations.
The 40 Committee's members are the Director of Central
Intelligence, the Under Secretary of State for Political Affairs,
the Deputy Secretary of Defense, and the Chairman of the
Joint Chiefs of Staff. (At the time of the Chilean meeting.
Attorney General John Mitchell was also a member.) It is
this small group of bureaucrats and politicians — in close
consultation with the President and the governmental depart-
ments the men represent — that directs America's secret for-
eign policy.
On that Saturday in June 1970, the main topic before the
40 Committee was: Whal, if any, secret actions should be
taken to prevent the election of Salvador Allende? The
Chilean election was scheduled for the following September,
and Allende, a declared Marxist, was one of the principal
candidates. Although Allende had pledged to maintain the
democratic system if he was elected, the U.S. ambassador to
Chile, Edward Korry, predicted dire consequences in the
event of an Allende victory. Korry feared Allende would
lead his country into the Communist bloc, and thus he strongly
The Clandestine Theory
13
favored CIA iniervention to make sure that Chile did not
become another Cuba.
Most of the American companies with large investments
in Chile were also fearful of a possible Allende triumph, and
at least two of those companies, the International Telephone
and Telegraph Corporation (ITT) and Anaconda Copper,
were spending substantial sums of money to prevent his
election.
Ambassador Korry's superiors at the State Department in
Washington opposed the idea of CIA intervention. They
believed that the interests of the United States would best be
served if events in Chile were allowed to follow their natural
course. They hoped that Allende would not win, but they
opposed active — even if secret — American intervention against
him. T o try to manipulate the Chilean electoral processes,
believed the Stale group led by Assistant Secretary for Latin
America Charles Meyer, would likely succeed only in mak-
ing matters worse and further tarnishing America's image in
Latin America.
Richard Helms, then director of the CIA, represented a
somewhat divided Agency. On the one hand, the 40 Commit-
tee was that day considering plans for covert intervention
which had been drawn up by the Agency's Clandestine
Services;* and like the American ambassador, the CIA's
principal representative in Chile strongly supported covert
action to keep Allende out of office. But, on the other hand,
there was a lack of confidence among senior CIA officials
that secret agency funding and propaganda would have the
desired effea. They were concerned that a large influx of
CIA money might lead to discovery of the agency's role by
the Chilean press — perhaps with help from the Soviet
KGB — or by American reporters, and that such disclosures
would only help Allende.
Helms' position at the 40 Committee meeting was influ-
enced by memories of the Chilean presidential election of
1964. At that time he had been chief of the Clandestine
Services and had been actively involved in planning the
CIA's secret efforts to defeat Allende, who was then run-
*The official name for this pan of ihe CIA is the Directorate of Operaiions
(until early 1973 Ihe Directorate of Plans), hut it Is more appropriately re-
ferred to within the agency as the Clandestine Services. Some members of
Congress and certain journalists call it the "Department of Dirty Tricks." a
title never used by CIA personnel.
14
The CIA and the Cull of Intelligence
ning against Eduardo Frei.* Frei had won the Presidency,
but now, six years later, he was constitutionally forbidden to
succeed himself, and Allende's candidacy therefore seemed
stronger than before.
Anti-American feelings had grown in Chile since 1964, and
one reason was widespread resentment of U.S. interference
in Chile's internal affairs. The Chilean leftist press had been
full of charges of CIA involvement in the 1964 elections, and
these reports had not been without effect on the electorate.
Additionally, in 1965 the exposure of the Pentagon's ill-advised
Project Camelot had further damaged the reputation of the
U.S. government. Ironically, Chile was not one of the princi-
pal target countries of the Camelot project, a multimillion-
dollar social-science research study of possible counterin-
surgency techniques in Latin America. But the existence of
Camelot had Hrst been made public in Chile, and newspapers
there — of all political stripes — condemned the study as
"intervention" and "imperialism." One paper said, in prose
typical of the general reaction, that Project Camelot was
"intended to investigate the military and political situation
prevailing in Chile and to determine the possibility of an
anti-democratic coup." Politicians of both President Frei's
Christian Democratic Party and Allende's leftist coalition
protested publicly. TTie final result was to cause Washington
to cancel first Camelot's limited activities in Chile, and then
the project as a whole. While the CIA had not been a
sponsor of Camelot, the project added to the fears among
Chileans of covert American intelligence activities.
In 1968 the CIA's own Board of National Estimates, after
carefully studying the socio-political problems of Latin
America, had produced a National Intelligence Estimate on
that region for the U.S. government's planners and policy-
makers. The central conclusion had been thai forces for
change in the developing Latin nations were so powerftil as
to be beyond outside manipulation. This estimate had been
'Nine years later Laurence Stern of the WasUngion Post finally exposed the
CIA's massive clandestine effort in the l%4 Chilean election. He quoted a
strategically placed U.S. intelligence official as saying, "U.S. government
intervention in Chile was blatant and almost obscene." Stern reported that
both the State Department and the Agency for International Development
cooperated with the CIA in funneling up to S2n million into the country, and
that one conduit for the funds was an ostensibly private organization called
the International Development Foundation.
The Clandestine Theory
15
endorsed by the United States Intelligence Board, whose
members include the heads of the government's various intel-
ligence agencies, and had then been sent to the White House
and to those departments that were represented on the 40
Committee.
The 1968 estimite had in efTect urged against the kind of
intervention that the 40 Committee was in 1970 considering
with regard to Chile. But as is so often the case within the
government, the most careful advance analysis based on all
the intelligence available was either ignored or simply re-
jected when the time came to make a decision on a specific
issue.
4Vi LINES DELETED
Henry Kissinger, the single most powerful man at the 40
Committee meeting on Chile, clearly wanted to intervene.
Kissinger was also concerned about the need for absolute
secrecy and the near impossibility of hiding massive Ameri-
can involvement. He, too. knew that discovery would work
to Allende's advantage. So at Kissinger's urging, the 40
Commillee agreed thai the CIA would carry out a relatively
modest $400,000 program of secret propaganda and support
for Allende's opponents. While CIA men and money would
be brought into play to prevent an Allende victory, there
would be no repeat of the agency's massive effort to fix the
election in 1964.
Within the next few days. President i\iron endorsed the 40
Committee's decision, and the American ambassador and the
CIA chief of station in Chile were notified to start the covert
propaganda programs.
Ambassador Korry reacted to the go-ahead from Washing-
ton by sending a cable back to Assistant Secretary Meyer
through "Roger, " a communication channel, which, at least
in theory, only the Stale Department could decipher. Korry
knew that Meyer had actively- apposed his recommendation
for intervention, and Korry staled in the cable that he would
not begin the anti-Allende compaign without the direct ap-
proval o f Meyer, his nominal superior. Since the decision to
intervene had been approved by the President of the United
States . . . Meyer was forced to send a message back to Korry
stating that his own views were irrelevant since "higher
authority" had given its blessing to the project.
16
The CIA and the Cult of Intelligence
In keeping with the guidelines set down by the 40 Commit-
tee and approved by the President, four hundred thousand
dollars were made available from the CIA director's secret
contingency fund and earmarked for the Chilean election
operation. The agency's chief of station in Santiago, work-
ing with the close cooperation of Ambassador Korry, put the
money and his undercover agents to work in a last-minute
propaganda effort to thwart the rise of Allende to the
Presidency. But despite the CIA's covert action program,
Salvador Allende received a plurality in the September 1970
popular vote.
During the next two months, before Allende was oincially
endorsed as President by the Chilean congress, the CIA and
Ambassadftr Korry, with White House approval, tried desper-
ately to prevent the Marxist from taking office. Attempts
were made to undercut Allende through continued propa-
ganda, by encouraging a military coup d'etat, and by trying
to enlist the support of private U.S. firms, namely ITT, in a
scheme to sabotage Chile's economy. Sane of the secret
actions, however, proved successful.
Some months afterward President Nixon disingenuously
explained at a While House press conference: "As far as
what happened in Chile is concerned, we can only say that
for the United States to have intervened in a free election
and to have turned it around, I think, would have had
repercussions all around Latin America that would have
been far worse than what happened in Chile."
The following year, in the fall of 1972, CIA Director Helms,
while giving a rare public lecture at Johns Hopkins University,
was asked by a student if the CIA had mucked about in the
1970 Chilean election. His response: "Why should you care?
Your side won."
Helms was understandably perturbed. Columnist Jack
Anderson had only recently reported "the ITT story," which
among other things revealed that the CIA had indeed been
involved in an effort to undo Allende's victory — even after
he had won the popular vote. Much to the agency's chagrin,
Anderson had shown that during September and October
1970, William Broe, chief of the Western Hemisphere Divi-
sion of the CIA's Clandestine Services, had met several
times with high officials of ITT to discuss ways to prevent
Allende from taking office. (The ITT board member who
later admitted to a Senate investigative committee that he
The Clandestine Theory
17
had played the key role in bringing together CIA and ITT
officials was John McCone, Director of the CIA during the
Kennedy administration and, in 1970, a CIA consultant.)
Broe had proposed to ITT and a few other American corpo-
rations with substantial financial interests in Chile a four-
part plan of economic sabotage which was calculated to
weaken the local economy to the point where the Chilean
military authorities would move to take over the government
and thus frustrate the Marxist's rise to power. ITT and the
other firms later claimed they ttad found the CIA's scheme
"not workable." But almost three years to the day after
Allende's election, at a time when severe inflation, truckers'
strikes, food shortages, and international credit problems
were plaguing Chile, he was overthrown and killed in a
bloody coup d'ftat carried out by the combined action of the
Chilean armed services and national police. His Marxist
government was replaced by a military junta What role
American businesses or the CIA may have played in the
coup is not publicly known, and may never be. ITT and the
other giant corporations with investments in Chile have all
denied any involvement in the military revolt. So has the
U.S. government, although CIA Director William Colby
admitted in secret testimony before the House Foreign Af-
fairs Committee (revealed by Tad Szulc in the October 21,
1973, Washington Post) that the agency "had some intelli-
gence coverage about the various moves being made," that
it had "penetrated" all of Chile's major political parties, and
that it had secretly furnished "some assistance" to certain
Chilean groups. Colby, himself the former director of the
bloody Phoenix counterintelligence program in Vietnam, also
told the Congressmen that the executions carried out by the
junta after the coup had done "some good" because they
reduced the chances that civil war would break out in
Chile — an excellent example of the sophistry with which the
CIA defends its strategy of promoting "stability" in the
Third World.
Even if the CIA did not intervene directly in the final
putsch, the U.S. government as a whole did take a series of
actions designed to undercut the Allende regime. Henry
Kissinger set the tone of the official U.S. position at a
background press conference in September 1970, when he
said that Allende's Marxist regime would contaminate
Argentina, Bolivia, and Peru — a stretch of the geopolitical
18
The CIA and the Cull of Intelligence
imagination reminiscent of the Southeast Asian domino theory.
Another measure of the White Mouse attitude — and an
indication of the methods it was willing to use — was the
burglarizing of the Chilean embassy in Washington in May
1972 by some of the same men who the next month staged
the break-in at the Watergate. And the U.S. admittedly
worked to undercut the Allende government by cutting off
most economic assistance, discouraging private lines of credit,
and blocking loans by international organizations. State De-
partment officials testifying before Congress after the coup
explained it was the Nixon administration's wish that the
Allende regime collapse economically, thereby discrediting
socialism.
Henry Kissinger has dismissed speculation among journal-
ists and members of Congress that the CIA helped along this
economic collapse and then engineered Allende's downfall;
privately he has said that the secret agency wasn't competent
to manage an operation as difficult as the Chilean coup.
Kissinger had already been supervising the CIA's most se-
cret operations for more than four years when he made this
disparaging remark. Whether he was telling the truth about
the CIA's non-involvement in Chile or was simply indulging
in a bit of official lying (called "plausible denial"), he along
with the President would have made the crucial decisions on
the Chilean situation. For the CIA is not an independent
agency in the broad sense of the term, nor is it a governmen-
tal agency out of control. Despite occasional dreams of
grandeur on the part of some of its clandestine operators,
the CIA does not on its own choose to overthrow distasteful
governments or determine which dictatorial regimes to
support. Just as the State Department might seek, at the
President's request, to discourage international aid institu-
tions from offering loans to "unfriendly" governments, so
does the CIA act primarily when called upon by the Executive.
The agency's methods and assets are a resource that come
with the office of the Presidency.
Thus, harnessing the agency's clandestine operations is
not the full, or even basic, solution to the CIA problem. The
key to the solution is controlling and requiring accountability
of those in the White House and elsewhere in the govern-
ment who direct or approve, then hide behind, the CIA and
its covert operations. This elusiveness, more than anything
else, is the problem posed by the CIA.
The Clandestine Theory
19
Intelligence Versus Covert Action
The primary and proper purpose of any national intelligence
organization is to produce "finished intelligence" for the
government's policy-makers. Such intelligence, as opposed
to the raw information acquired through espionage and other
clandestine means, is data collected from all sources — secret,
official, and open — which has been carefully collated and
analyzed by substantive experts, specifically to meet the
needs of the national leadership. The process is difficult,
time-consuming, and by no means without error. But it is
the only prudent alternative to naked reliance on the unrelia-
ble reporting of spies. Most intelligence agencies, however,
are nothing more than secret services, more fascinated by
the clandestine operations — of which espionage is but one
aspect — than they are concerned with the production of
"finished intelligence." The CIA, unfortunately, is no excep-
tion to this rule. Tactics that require the employment of
well-placed agents, the use of money, the mustering of merce-
nary armies, and a variety of other covert methods designed
to influence directly the policies (or determine the life-spans)
of foreign governments — such are the tactics that have come
to dominate the CIA. This aspect of the modern intelligence
business — intervention in the affairs of other countries — is
known at the agency as covert action.
The United States began engaging in covert-action opera-
tions in a major way during World War II. Taking lessons
from the more experienced British secret services, the Office
of Strategic Services (OSS) learned to use covert action as
an offensive weapon against Germany and Japan. When the
war ended. President Truman disbanded the OSS on the
grounds that such wartime tactics as paramilitary operations,
psychological warfare, and political manipulation were not
acceptable when the country was at peace. At the same
time, however, Truman recognized the need for a perma-
nent organization to coordinate and analyze all the intelli-
gence available to the various governmental departments.
He believed that if there had been such an agency within the
U.S. government in 1941, it would have been "difficult, if not
impossible" for the Japanese to attack Pearl Harbor suc-
cessfully.
It was, therefore, with "coordination of information" in
mind that Truman proposed the creation of the CIA in 1947.
20 The CIA and the Cult of Iruelligence
Leading the opposition to Truman's "limited" view of
intelligence, Allen Dulles stated, in a memorandum pre-
pared for the Senate Armed Services Committee, that
"Intelligence work in time of peace will require other
techniques, other personnel, and will have rather different
objectives. . . . We must deal with the problem of conflicting
ideologies as democracy faces communism, not only in the
relations between Soviet Russia and the countries of the
west but in the internal political conflicts with the countries
of Europe, Asia, and South America." It was Dulles — ^to
become CIA director six years later — who contributed to the
eventual law the clause enabling the agency to carry out
"such other functions and duties related to intelligence as
the National Security Council may from time to time direct."
It was to be the fulcrum of the CIA's power.
Although fifteen years later Truman would claim that he
had not intended the CIA to become the covert-action arm
of the U.S. government, it was he who, in 1948, authorized
the first postwar covert-action program, although he did not
at first assign the responsibility to the CIA. Instead he
created a largely separate organization called the Office of
Policy Coordination (OPC), and named a former OSS man,
Frank G. Wisner, Jr., to be its chief. Truman did not go to
Congress for authority to form OPC. He did it with a stroke
of the presidential pen, by issuing a secret National Security
Council Intelligence directive, NSC 10/2. (The CIA provided
OPC with cover and support, but Wisner reported directly
to the secretaries of State and Defense.) Two years later,
when General Walter Bedell Smith became CIA director, he
moved to consolidate all major elements of national intelli-
gence under his direct control. As part of this effort, he
sought to bring Wisner's operations into the CIA. Truman
eventually concurred, and on January 4, 19S1, OPC and the
Office of Special Operations (a similar semi-independent
organization established in 1948 for covert intelligence col-
lection) were merged into the CIA, forming the Directorate
of Plans or, as it became known in the agency, the Clandes-
tine Services. Allen Dulles was appointed first chief of the
Clandestine Services; Frank Wisner was his deputy.
With its newly formed Clandestine Services and its involve-
ment in the Korean war, the agency expanded rapidly. From
less than 5,000 employees in 1950, the CIA grew to about
15,000 by 1955 — and recruited thousands more as contract
The Clandestine Theory
21
employees and foreign agents. During these years the agency
spent well over a billion dollarr; to strengthen non-communist
governments in Western Europe, to subsidize political parties
around the world, to found Radio Free Europe and Radio
Liberty for propaganda broadcasts to Eastern Europe, to
make guerrilla raids into mainland China, to create the Asia
Foundation, to overthrow leftist governments in Guatemala
and Iran, and to carry out a host of other covert-action
programs.
While the agency considered most of its programs to have
been successful, there were more than a few failures. Two
notable examples were attempts in the late 1940s to establish
guerrilla movements in Albania and in the Ukraine, in keep-
ing with the then current national obsession of "rolling back
the Iron Curtain." Almost none of the agents, funds, and
equipment infiltrated by the agency into those two countries
was ever seen or heard from again.
In the early 1950s another blunder occurred when the CIA
tried to set up a vast underground apparatus in Poland for
espionage and, ultimately, revolutionary purpKJses. llie opera-
tion was supported by millions of dollars in agency gold
shipped into Poland in installments. Agents inside Poland,
using radio broadcasts and secret writing techniques, main-
tained regular contact with their CIA case officers in West
Germany. In fact, the agents continually asked that addi-
tional agents and gold be sent to aid the movement.
Occasionally an agent would even slip out of Poland to report
on the operation's progress — and ask for still more agents
and gold. It took the agency several years to leam that the
Polish secret service had almost from the first day co-opted
the whole network, and that no real CIA underground opera-
tion existed in Poland. The Polish service kept the operation
going only to lure anti-communist Polish emigres back home —
and into prison. And in the process the Poles were able to
bilk the CIA of millions of dollars in gold.
One reason, perhaps the most important, that the agency
tended from its very beginnings to concentrate largely on
covert-action operations was the fact that in the area of
traditional espionage (the collection of intelligence through
spies) and CIA was able to accomplish Itttle against the
principal enemy, the Soviet Union. With its closed society,
the U.S.S.R. proved virtually impenetrable. The few Ameri-
can intelligence officers entering the country were severely
22
The CIA and the Cull of Inielligence
limited in their movements and closely followed. The Soviet
Union's all-pervasive internal security system made the re-
cruitment of agents and the running of clandestine operations
next to impossible. Similar difficulties were experienced by
the CIA in Eastern Europe, but to a lesser degree. The
agency's operators could recruit agents somewhat more eas-
ily there, but strict security measures and efficient secret-
police establishments still greatly limited successes.
Nevertheless, there were occasional espionage coups, such
as the time CIA operators found an Eastern European com-
munist official able to provide them with a copy of Khru-
shchev's 1956 de-Stalinization speech, which the agency then
arranged to have published in the New York Times. Or,
from time to time, a highly knowledgeable defector would
bolt to the West and give the agency valuable information.
Such defectors, of course, usually crossed over of their own
volition, and not because of any ingenious methods used by
the CIA. A former chief of the agency's Gandestine Services,
Richard Bissell, admitted years later in a secret discussion
with selected members of the Council on Foreign Relations:
"In practice however espionage has been disappointing. . . .
The general conclusion is that against the Soviet bloc or
other sophisticated societies, espionage is not a primary source
of intelligence, although it has had occasional brilliant
successes."'
It had been Bissell and his boss Allen Dulles who by the
mid-19S0s had come to realize that if secret agents could not
do the job, new ways would have to be found to collect
intelligence on the U.S.S.R. and the other communist
countries. Increasingly, the CIA turned to machines to per-
form its espionage mission. By the end of the decade, the
agency had developed the U-2 spy plane. This high-altitude
aircraft, loaded with cameras and electronic listening devices,
brought back a wealth of information about Soviet defenses
and weapons. Even more important was communications
intelligence (COMINT), electronic transmissions monitored
at a cost of billions of dollars by the Defense Department's
National Security Agency (NSA).
Both Bissell and Dulles, however, believed that the suc-
'This ind all suhscquent quotes from Ihe Bissell speech come from the official
minutes of the meeting. The minutes do not quote Bissell directly but. rather,
paraphrase his remarks.
The Clandestine Theory
23
cessful use of human assets was at the heart of the intelli-
gence craft. Thus, it was clear to them that if the Clandestine
Services were to survive in the age of modern technical
espionage, the agency's operators would have to expand
their covert-action operations — particularly in the internal
affairs of countries where the agency could operate clandes-
tinely.
In the immediate postwar years. CIA covert-action pro-
grams had been concentrated in Europe, as communist ex-
pansion into Western Europe seemed a real threat. The Red
Army had already occupied Eastern Europe, and the war-
ravaged countries of the West, then trying to rebuild shat-
tered economics, were particularly vulnerable. Consequently,
the CIA subsidized political parties, individual leaders, labor
unions, and other groups, especially in West Germany, France,
and Italy. It also supported Eastern European emigre groups
in the West as part of a program to organize resistance in the
communist countries. "There were so many CIA projects at
the height of the Cold War," wrote columnist Tom Braden
in January 1973, "that it was almost impossible for a man to
keep them in balance." Braden spoke from the vantage
point of having himself been the CIA division chief in charge
of many of these programs. By the end of the 1950s, however,
pro-American governments had become firmly established
in Western Europe, and the U.S. government, in effect, had
given up the idea of "rolling back the Iron Curtain."
Thus, the emphasis within the Clandestine Services shifted
toward the Third World. This change reflected to a certain
extent the CIA's bureaucratic need as a secret agency to find
areas where it could be successful. More important, the shift
came as a result of a hardened determination that the United
States should protect the rest of the world from communism.
A cornerstone of that policy was secret intervention in the
internal affairs of countries particularly susceptible to social-
ist movements, either democratic or revolutionary. Years
later, in a letter to Washington Post correspondent Chalmers
Roberts, Allen Dulles summed up the prevailing attitude of
the times. Referring to the CIA's coups in Iran and Guate-
mala, he wrote: "Where there begins to be evidence that a
country is slipping and Communist takeover is threatened
. . . we can't wait for an engraved invitation to come and
give aid."
The agency's orientation toward covert action was quite
24
The CIA and the Cult of Intelligence
obvious to young officers taking operational training during
the mid-l9S0s at "The Farm," the CIA's West Point, located
near Williamsburg, Virginia, and operated under the cover
of a military ba-se called Camp Peary. Most of the methods
and techniques taught there at that time applied to covert
action rather than traditional espionage, and to a great ex-
tent training was oriented toward such paramilitary activities
as infiltration/exfiltration, demolitions, and nighttime para-
chute jumps. Agency officers, at the end of their formal
clandestine education, found that most of the job openings
were on Covert Action Staff and in the Special Operations
Divsion (the CIA's paramilitary component). Assignments
to Europe became less coveted, and even veterans with
European experience were transferring to posts in the emerg-
ing nations, especially in the Far East.
Tlie countries making up the Third World offered far
more tempting targets for covert action than those in Europe.
These nations, underdeveloped and often corrupt, seemed
made to order for the clandestine operators of the CIA,
Richard Bissell told the Council on Foreign Relations: "Simply
because [their] governments are much less highly organized
there is less security consciousness; and there is apt to be
more actual or potential diffusion of power among parties,
localities, organizations, and individuals outside the central
government." And in the frequent power struggles within
such governments, all factions are grateful for outside
assistance. Relatively small sums of money, whether deliv-
ered directly to local forces or deposited (for their leaders)
in Swiss bank accounts, can have an almost magical effect in
changing volatile political loyalties. In snrh an atmosphere,
the CIA's Clandestine Services have over the years enjoyed
considerable success.
Swashbucklers and Secret Wars
During the 1950s most of the CIA's covert-action operations
were not nearly so sophisticated or subtle as those Bissell
would advocate in 1968. Nor were they aimed exclusively at
the rapidly increasing and "less highly organized" govern-
ments of the Third World. Covert operations against the
communist countries of Europe and Asia continued, but the
emphasis was on clandestine propaganda, infiltration and
manipulation of youth, labor, and cultural organizations.
The Clandestine Theory
25
and the like. The more heavy-handed activities — paramilitary
operations, coups, and countercoups — were now reserved
for the operationally ripe nations of Asia, Africa, and Latin
America.
Perhaps the prototype for CIA covert operations during
the 1950s was the work of Air Force Colonel Edward Lansdale.
His exploits under agency auspices, first in the Philippines
and then in Vietnam, became so well known that he served
as the model for characters in two best-selling novels, The
Ugly American by William J. Lederer and Eugene Burdick,
and The Quiei American by Graham Greene. In the former,
he was a heroic figure: in the latter, a bumbling fool.
Lansdale was sent to the Philippines in the early 1950s as
advisor to Philippine Defense Minister (later President) Ram6n
Magsaysay in the struggle against the ttuks, the local commu-
nist guerrillas. Following Lansdale's counsel. Magsaysay
prompted social development and land reform to win sup-
port of the peasantry away from the Huks. But Lansdale,
backed up by millions of dollars in secret U.S. government
funds, took the precaution of launching other, less conven-
tional schemes. One such venture was the establishment of
the Filipino Civil Affairs Office, which was made responsible
for psychological warfare.
After a 1972 interview with Lansdale, now living in quiet
retirement, journalist Stanley Karnow reported:
One [Lansdale-initiated] psywar operation played on
the superstitious dread in the Philippine countryside of
the asuang, a mythical vampire. A psywar squad en-
tered an area, and planted rumors that an asuang lived
on where the Communists were based. Two nights later,
after giving the rumors time to circulate among Huk
sympathizers, the psywar squad laid an ambush for the
rebels. When a Huk patrol passed, the ambushers
snatched the last man, punctured his neck vampire-
fashion with two holes, hung his body until the blood
drained out, and put the corpse back on the trail. As
superstitious as any other Filipinos, the insurgents fled
from the region.
With Magsaysay's election to the Philippine Presidency in
1953, Lansdale returned to Washington. In the eyes of the
U.S. government, his mission had been an unquestioned
26
The CIA and the Cult of Intelligence
success: the threat of a communist takeover in the Phihp-
pines had been eliminated.
A year later, after Vietnam had been provisionally split in
two by the Geneva Accords, Lansdale was assigned to South
Vietnam to bolster the regime of Ngo Dinh Diem. He quickly
became involved in organizing sabotage and guerrilla opera-
tions against North Vietnam, but his most effective work
was done in the South. There he initiated various psycho-
logical-warfare programs and helped Diem in eliminating
his political rivals. His activities, extensively described in
the Pentagon Papers, extended to pacification programs,
military training, even political consultation: Lansdale helped
design the ballots when Diem formally ran for President of
South Vietnam in 1955. He used red, the Asian goodluck
color, for Diem and green — signifying a cuckold — for Diem's
opponent. Diem won with an embarrassingly high 98 percent
of the vote, and Lansdale was widely credited within Ameri-
can government circles for having carried out another suc-
cessful operation. He left Vietnam soon afterward.
Meanwhile, other agency operators, perhaps less cele-
brated than Lansdale, were carrying out covert-action pro-
grams in other countries. Kermit Roosevelt, of the Oyster
Bay Roosevelts, master-minded the 1953 putsch that over-
threw Iran's Premier Mohammed Mossadegh. The Guate-
mala coup of 1954 was directed by the CIA. Less successful
was the attempt to overthrow Indonesian President Sukarno
in the late 19SOs. Contrary to deniab by President Eisen-
hower and Secretary of State Dulles, the CIA gave direct
assistance to rebel groups located on the Island of Sumatra.
Agency B-26s even carried out bombing missions in support
of the insurgents. On May 18, 1958, the Indonesians shot
down one of these B-26s and captured the pilot, an Ameri-
can named Allen Pope. Although U.S. government officials
claimed that Pope was a "soldier of fortune," he was in fact
an employee of the CIA-owned proprietary company, Civil
Air Transport. Within a few months after being released
from prison four years later. Pope was again flying for the
CIA — this time with Southern Air Transport, an agency
proprietary airline based in Miami.
As the Eisenhower years came to an end, there still was a
national consensus that the CIA was justified in taking al-
most any action in that "back alley" struggle against
communism — this despite Eisenhower's clumsy effort to lie
The Clandestine Theory
27
his way out of the U-2 shootdown. which lying led to the
cancellation of the 1960 summit conference. Most Americans
placed the CIA on the same above-politics level as the FBI,
and it was no accident that President-elect Kennedy chose to
announce on the same day that both J. Edgar Hoover and
Allen Dulles would be staying on in his administration.
It took the national shock resulting from the abortive Bay
of Pigs invasion in 1961 to bring about serious debate over
CIA operations — among high government officials and the
public as a whole. Not only had the CIA failed to overthrow
the Castro regime, it had blundered publicly, and the U.S.
government had again been caught lying. For the first time,
widespread popular criticism was directed at the agency.
And President Kennedy, who had approved the risky
operation, came to realize that the CIA could be a definite
liability — to both his foreign policy and his personal political
fortunes — as well as a secret and private asset of the
Presidency. Determined that there would be no repetition of
the Bay of Pigs, Kennedy moved quickly to tighten White
House control of the agency. He reportedly vowed "to splin-
ter the CIA in a thousand pieces and scatter it to the winds."
But the President's anger was evidently more the result of
the agency's failure to overthrow Castro than a reaction to
its methods or techniques. While neither agency funding nor
operations were cut back in the aftermath, the Bay of Pigs
marked the end of what was probably the CIA's Golden
Age. Never again would the secret agency have so totally
free a hand in its role as the clandestine defender of Ameri-
can democracy. Kennedy never carried through on his threat
to destroy the CIA, but he did purge three of the agency's
top officials, and thus made clear the lines of accountability.
If Allen Dulles had seemed in Kennedy's eyes only a few
months earlier to be in the same unassailable category as
J. Edgar Hoover, the Bay of Pigs had made him expendable.
In the fall of 1961 John McCone, a defense contractor who
had formerly headed the Atomic Energy Commission, re-
placed Dulles as CIA Director; within months Major Gen-
eral Marshall "Pat" Carter took over from Major General
Charles Cabell as Deputy Director, and Richard Helms be-
came chief of the Clandestine Services in place of Richard
Bissell.
Kennedy also ordered General Maxwell Taylor, then spe-
cial military advisor to the President and soon to be Chair-
28
The CIA and the Cull of Inielligence
man of the Joint Chiefs of Staff, to make a thorough study of
U.S. intelligence. Taylor was joined by Attorney General
Robert Kennedy, Dulles, and Naval Chief Admiral Arleigh
Burke. The Taylor committee's report was to a large extent
a critique of the tactics used in — not the goals of — the Bay of
Pigs operation. It did not call for any fundamental restructur-
ing of the CIA, although many outside critics were urging
that the agency's intelligence-collection and analysis func-
tions be completely separated from its covert-action arm.
The committee's principal recommendation was that the CIA
should not undertake future operations where weapons larger
than hand guns would be used.
Taylor's report was accepted, at least in principle, by the
Kennedy administration, but its primary recommendation
was disregarded almost immediately. CIA never shut down
its two anti-Castro operations bases located in southern
Rorida, and agency-sponsored raids against Cuba by exile
groups continued into the mid-1960s, albeit on a far smaller
scale than the Bay of Pigs. The agency also became deeply
involved in the chaotic struggle which broke Qut in the
Congo in the eartj 1960s. CUndestine Service operators
re|[olarly bought and sold Congolese politicians, and the
agency supplied money and arms to the snpporters of Cyril
Adouia and Joseph Mobula. By 1964, the CIA had im-
ported its own mercenaries into the Congo, and the agency's
B-26 bombers, down by Cuban exile pilots — many of whom
were Bay of Pigs veterans — were carrying out regular mis-
sions against insurgent groups.
During these same years American involvement in Viet-
nam expanded rapidly, and the CIA, along with the rest of
the U.S. government, greatly increased the number of its
personnel and programs in that country. Among other
activities, the agency organized guerrilla and small-boat at-
tacks on North Vietnam, armed and controlled tens of thou-
sands of Vietnamese soldiers in irregular units, and set up a
giant intelligence and interrogation system which reached
into every South Vietnamese village.
In neighboring Laos, the CIA actually led the rest of the
U.S. government — at the White House's order — into a mas-
sive American commitment. Although the agency had been
carrying out large-scale programs of political manipulation
and other covert action up to 1962, that year's Geneva agree-
ment prohibiting the presence of foreign troops in Laos
The Clandestine Theory
29
paradoxically opened up the country to the CIA. For almost
from the moment the agreement was signed, the Kennedy
administration decided not to pull back but to expand Ameri-
can programs in Laos. This was justified partly because the
North Vietnamese were also violating the Geneva Accords;
partly because Kennedy, still smarting from his Cuban setback,
did not want to lose another confrontation with the com-
munists; and partly because of the strategic importance placed
on Laos in the then-fashionable "domino theory." Since the
United States did not want to admit that it was not living up
to the Geneva agreement, the CIA — whose members were
not technically "foreign troops" — got the job of conducting
a "secret" war. TUe Laotian operation became one of the
largest and most expensive in the agency's history: more
than 35,UUO opium-growing Meo and other Lao mountain
tribesmen were recruited into the CIA's private army.
L'Armde Clandestine; CIA-hired pilots flew bombing and
supply missions in the agency's own planes; and, finally,
when L'Armee Clandestine became less effective after long
years of war, the agency recruited and financed over 17.000
Thai mercenaries for its war of attrition against the communists.
By the late 1960s, however, many CIA career officers were
expressing opposition to the agency's Laotian and Vietnamese
programs — not because they objected to the Indochina wars
(few did), but because the programs consisted for the most
part of huge, unwieldy, semi-overt paramilitary operations
lacking the sophistication and secrecy that most of the agency's
operators preferred. Furthermore, the wars had dragged on
too long, and many officers viewed them as unwinnable
messes. The agency, therefore, found itself in the awkward
position of being unable to attract sufficient volunteers to
man the field assignments in Vietnam. Consequently, it was
forced to draft personnel from other areas of its clandestine
activity for service in Southeast Asia.
Covert-Action Theory
It was in such an atmosphere of restiveness and doubt, on a
January evening in 1968, that a small group of former intelli-
gence professionals and several other members of the cult of
intelligence met to discuss the role of the CIA in U.S.
foreign policy, not at CIA headquarters in Langley, Virginia,
but at the Harold Pratt House on Park Avenue — the home
30
The CIA and the Cull of Intelligence
of the Council on Foreign Relations. The discussion leader
was investment banker C. Douglas Dillon, previously Under
Secretary of State and Secretary of the Treasury; the main
speaker was Richard Bissell, the former chief of the agency's
Clandestine Services, still a consultant to the CIA, and now
a high-ranking executive with the United Aircraft Corporation.
Like most other former agency officials, Bissell was reluc-
tant to make his views on intelligence known to the public,
and the meeting was private.
In 1971. however, as part of an anti-war protest, radical
students occupied the building in Cambridge. Massachusetts,
that houses Harvard University's Center for International
Affairs. Once inside, the protesters proceeded to barricade
the entrances and ransack the flies of faculty members who
worked there. Among the documents they discovered were
the confidential minutes of the January 8, 1968, meeting at
Pratt House. The minutes were not absolutely complete;
Center associate William Harris, who had served as rappor-
teur for the meeting, later admitted privately, after the docu-
ment had been reprinted by the African Research Group,
that it had been partially edited to eliminate particularly
sensitive material. Even so. the purloined version was still
the most complete description of the CIA's covert-action
strategy and tactics ever made available to the outside
world. Aside from a few newspaper articles which appeared
in 1971. however, when it was reprinted by the African
Research Group, the Bissell papter attracted almost no inter-
est from the American news media.
Among the CIA's senior Clandestine Services offlcers. Rich-
ard Bissell was one of a very few who had not spent World
War II in the OSS; in all other respects, he was the ideal
agency professional. A product of Groton and Yale, he had
impeccable Eastern Establishment credentials. Such a back-
ground was not absolutely essential to success in the CIA,
but it certainly helped, especially during the Allen Dulles
years. And Bissellalso had the advantage of scholarly training,
having earned a doctorate in economics and then having
taught the subject at Yale and MIT. He joined the CIA in
1954 and immediately showed a great talent for clandestine
work. By 1958 Dulles had named Bissell head of the Clandes-
tine Services.
At the beginning of the Kennedy administration, Bissell
The Clandestine Theory
31
was mentioned in White House circles as the logical candi-
date to succeed Dulles, who was then near seventy. Brilliant
and urbane, Bissell seemed to fit perfectly, in David
Halberstam's phrase, the "best and the brightest" image of
the New Frontier. But Bissell's popularity with the Kennedy
administration was short-lived, for it was Bissell's Clandes-
tine Services which planned and carried out the Bay of Pigs
invasion of Cuba in April 1961. Bissell's operatives had not
only failed, they were not even successful in inventing and
maintaining a good cover story, or "plausible denial," which
every covert operation is supposed to have and which might
have allowed the Kennedy administration to escape the blame.
Fidel Castro had told the truth to the world about American
intervention in Cuba while the U.S. Secretary of State and
other administration officials had been publicly caught in
outright lies when their agency-supplied cover stories fell
apart. So Kennedy fired the CIA officials who had got him
into the Bay of Pigs, which he himself had approved; Bissell
was forced out along with Dulles and Deputy Director Charles
Cabell.
Bissell's replacement, Richard Helms, despite having been
second in command in the Clandestine Services, had man-
aged to stay remarkably untouched by the Bay of Pigs
operation. Years later a very senior CIA official would still
speak in amazement of the fact that not a single piece of
paper existed in the agency which linked Helms to either the
planning or the actual execution of the Bay of Pigs. This
senior official was not at all critical of Helms, who had been
very much involved in the overall supervision of the operation.
The official simply was impressed by Helms' bureaucratic
skill and good judgment in keeping his signature off the
documents concerning the invasion, even in the planning
stage.
Helms took over from Bissell as Clandestine Services chief
on February 17, 1962, and Bissell was awarded a secret intelli-
gence medal honoring him for his years of service to the
agency. But Bissell remained in close touch with clandestine
programs as a consultant; the CIA did not want to lose the
services of the man who had guided the agency into some of
its most advanced techniques. He had been among the first
during the 1950s to understand the hopelessness of spying
against the Soviets and the Chinese with classic espionage
methods, and hence had pushed the use of modern technol-
32
The CIA and the Cult of Intelligence
ogy as an intelligence tool. He had been instrumental in the
development of the U-2 plane, which had been among the
CIA's greatest successes until the Powers incident. Bissell
had also promoted, with the technical help of Kelly Johnson
and the so-called Skunk Works development facilities of
Lockheed Aircraft Corp., the A-11, later known as SR-71, a
spy plane that could fly nearly three times the speed of
sound at altitudes even higher than the U-2.
Moreover, Bissell had been a driving force behind the
development of space satellites for intelligence purposes — at
times to the embarrassment of the Air Force. He had quickly
grasped the espionage potential of placing high-resolution
cameras in orbit around the globe to photograph secret
installations in the Soviet Union and China. And due in
great part to the technical advances made by scientists and
engineers working under Bissell, the CIA largely dominated
the U.S. government's satellite reconnaissance programs in
the late 1950s and well into the 1960s. Even today, when the
Air Force has taken over most of the operational aspects of
the satellite programs, the CIA is responsible for many of
the research and development breakthroughs. At the same
time that Bissell was sparking many of the innovations in
overhead reconnaissance, he was guiding the Clandestine
Services into increased emphasis on covert-action progr.ims
in the Third World. It was Bissell who developed and put
into practice much of the theory and technique which be-
came standard operating procedure in the CIA's many inter-
ventions abroad.
Bissell spoke mainly about covert action that January night
in 1%8 at the Council on Foreign Relations in New York,
and the minutes provide a virtual textbook outline of covert
operations. Among his listeners were former CIA officials
Allen Dulles and Robert Amory, Jr., former State Depart-
ment intelligence chief Thomas Hughes, former Kennedy
aide Theodore Sorensen, columnist Joseph Kraft, and four-
teen others.* All those present were men who had spent
most of their lives either in or on the fringes of the
government. They could be trusted to remain discreet about
what they heard.
* A romplctc listing of Ihc pirlicipanls. as well as the available minutes of the
meeting, arc contained in the Appendix. "The Bissell Philosophy."
The Clandesiine Theory
33
Speaking freely to a friendly audience, the former Clandes-
tine Services chief said:
Covert action [is| attempting to influence the internal
affairs of other nations — sometimes called "interven-
tion" — by covert means.
... the technique is essentially that of "penetration,"
including "penetrations" of the sort which horrify classi-
cists of covert operations, with a disregard for the
"standards" and "agent recruitment rules." Many of the
"penetrations" don't take the form of "hiring" but of
establishing a close or friendly relationship (which may
or may not be furthered by the provision of money from
time to time).
Bissell was explaining that the CIA needs to have its own
agents on the inside — i.e., "penetrations" — if it wants to
finance a political party, guide the editorial policy of a news-
paper, or carry off a military coup. CIA clandestine operators
assigned overseas are called case officers, and they recruit and
supervise the "penetrations." Their tour^ of duty are normally
two to three years, and most serve with false titles in American
embassies. Some live under what is called "deep cover" in
foreign countries posing as businessmen, students, newsmen,
missionaries, or other seemingly innocent American visitors.
The problem of Agency operations overseas [Bissell
continued] is frequently a problem for the State Depart-
ment. It tends to be true that local allies find them-
selves dealing always with an American and an official
American — since the cover is almost invariably as a U.S.
government employee. There are powerful reasons for this
practice, and it will always be desirable to have some CIA
personnel housed in the Embassy compound, if only for
local "command post" and communcations requirements.
Nonetheless, it is possible and desirable, although diffi-
cult and time-consuming, to build overseas an apparatus
of unofficial cover. This would require the use or creation
of private organizations, many of the personnel of which
would be non-U. S. nationals, with freer entry into the
local society and less implication for the official U,S.
posture.
34
The CIA and the Cull of Intelligence
Whatever cover the case officer has. his role is to find
agents willing to work with or for the CIA. His aim is to
penetrate the host government, to leam its inner workings,
to manipulate it for the agency's purposes.
But for the larger and more sensitive interventions [Bissell
went on], the allies must have their own motivation. On
the whole the Agency has been remarkably successful in
finding individuals and instrumentalities with which and
through which it could work in this fashion. Implied in
the requirement for a pre-existing motivation is the
corollary that an attempt to induce the local ally to
follow a course he does not believe in will at least
reduce his effectiveness and may destroy the whole
operation.
Covert action is thus an exercise in seeking out "allies"
willing to cooperate with the CIA, preferably individuals
who believe in the same goals as the agency; at the very
least, people who can be manipulated into belief in these
goals. CIA case officers must be adept at convincing people
that working for the agency is in their interest, and a good
case officer normally will use whatever techniques are re-
quired to recruit a prospect: appeals to patriotism and anti-
communism can be reinforced with flattery, or sweetened
with money and power. Cruder methods involving blackmail
and coercion may also be used, but are clearly less desirable.
For covert action to be most effective, the recruitment and
penetration should be made long before an actual operation
is scheduled. When the U.S. government secretly decides to
provoke a coup in a particular country, it is then too late for
CIA case officers to be looking for local allies. Instead, if
the case officers have been performing their jobs well, they
will have already built up a network of agents in that country's
government, military forces, press, labor unions, and other
important groups; thus there is, in effect, a standing force in
scores of countries ready to serve the CIA when the need
arises. In the interim, many of these agents also serve the
agency by turning over intelligence obtained through their
official positions. This intelligence can often be of tactical
value to the CIA in determining local political power struc-
tures and calculating where covert action would be most
effective. Again, Bissell:
The Clandestine Theory
35
(There is a| need for continuing efforts to develop covert-
action capabilities even where there is no immediate
need to employ them. The central task is that of identify-
ing potential indigenous allies — both individuals and
organizations — making contact with them, and establish-
ing the fact of a community of interest.
This process is called, in intelligence parlance, "building
assets" or developing the operational apparatus. It is a stan-
dard function of all CIA clandestine stations and bases
overseas. And when a case officer is transferred to a new
assignment after several years in a post, he passes on his
network of agents and contacts to his replacement, who will
stay in touch with them as well as search out new "assets"
himself.
Depending on the size and importance of a particular
country, from one to scores of CIA case officers may oper-
ate there; together, their collective "assets" may number in
the hundreds. The planners of any operations will try to
orchestrate the use of the available assets so as to have the
maximum possible effect. Bissell;
Covert intervention is probably most effective in situa-
tions where a comprehensive effort is undertaken with a
number of separate operations designed to support and
complement one another and to have a cumulatively
significant effect.
In fact, once the CIA's case officers have built up their
assets, whether or not the United States will intervene at all
will be based in large part on a judgment of the potential
effectiveness, importance, and trustworthiness of the CIA's
agents or, in Bissell's words, "allies." Yet only case officers
on the scene and, to a lesser extent, their immediate superi-
ors in the United States are in a position to make this
judgment, since only the CIA knows the identity of its
agents. This information is not shared with outsiders or even
widely known inside the agency, where agents are listed by
code names even in top-secret documents. Thus, while the
political decision to intervene must be made in the White
House, it is the CIA itself (through its Clandestine Services)
which supplies the President and his advisors with much of
36 The CIA and the Cult of Intelligence
the crucial information upon which their decision to inter-
vene is based.
Even if the CIA's reputation for honesty and accurate
assessment were unassailable (which it is not), there would
still be a built-in conflict of interest in the system: the CIA
draws up the intervention plans; the CIA is the only agency
with the specific knowledge to evaluate the merits and the
feasibility of those plans; and the CIA is the action arm
which carries out the plans once they are approved. When
the CIA has its assets in place, the inclination within the
agency is to recommend their use; the form of intervention
recommended will reflect the type of assets which have been
earlier recruited. Further, simply because the assets are
available, the top officials of the U.S. government may well
rely too heavily on the CIA in a real or imagined crisis
situation. To these officials, including the President, covert
intervention may seem to be an easier solution to a particu-
lar problem than to allow events to follow their natural
course or to seek, a tortuous diplomatic settlement. The
temptation to interfere in another country's internal affairs
can be almost irresistible, when the means are at hand.
It is one of the contradictions of the intelligence profession,
as practiced by the CIA, that the views of its substantive
experts — its analysts — do not carry much weight with the
clandestine operators engaging in covert action. The opera-
tors usually decide which operations to undertake without
consulting the analysts. Even when pertinent intelligence
studies and estimates are readily available, they are as often
as not ignored, unless they tend to support the particular
covert-action cause espoused by the operators. Since the days
of the OSS, clandestine operators — especially in the field —
have distrusted the detached viewpoint of analysts not
directly involved in covert action. To ensure against contact
with the analysts (and to reduce interference by high-level
staff members, even those in the Office of the Director)
the operators usually resort to tight operational security —
the "need-to-know" principle — and to bureaucratic decep-
tions when developing or seeking approval of a covert-
action operation. Thus, it is quite possible in the CIA
for the intelligence analysts to say one thing, and for the
covert-action officers to get the authorization to do another.
Although the analysts saw little chance for a successful rebel-
lion against President Sukarno in 19S8, the Clandestine Ser-
The Clandestine Theory
37
vices supported the abortive coup d'eiat. Despite the analysts'
view that Castro's government had the support of the Cuban
people, the agency's operators attempted — and failed — at
the Bay of Pigs to overthrow him. In spite of large doubts on
the part of the analysts for years as to the efficacy of Radio
Free Europe and Radio Liberty, the CIA continued to fund
these propaganda efforts until 1971, when forced by Congress
to withdraw its support. Although the analysts clearly indi-
cated that the wars in Laos and Vietnam were not winnable,
the operational leadership of the CIA never ceased to devise
and launch new programs in support of the local regimes and
in the hope of somehow bringing about victory over the
enemy. The analysts had warned against involvemeni in
Latin American politics, but covert action was attempted
anyway to manipulate the 1964 and 1970 Chilean presiden-
tial elections.
In theory, the dichotomy that exists between the analytical
and clandestine components of the CIA is resolved at the
top of the agency. It is at the Director's level that the CIA's
analytical input is supposed to be balanced against the goals
and rislcs of the covert-action operation. But it does not
always, or even often, work that way. Directors like Allen
Dulles and Richard Helms, both long-time clandestine
operators, tend to allow their affinity for secret operations to
influence their judgment. Even a remote chance of success
was enough to win their approval of a covert-action proposal.
The views of the analysts, if requested at all, and if they
survived the bureaucratic subterfuge of the clandestine
operators, were usually dismissed by the agency's leadership
on the grounds that they were too vague or indecisive for the
purposes of operational planning.
Still, regardless of the preference of the Director of Cen-
tral Intelligence, it is the President or his National Security
Advisor who provides the ultimate direction and grants the
final approval for any significant covert-action program un-
dertaken by the CIA. Often in proposing such a program the
agency's operators are responding solely to a presidential
directive or to orders of the National Security Council. And
always when a CIA covert-action proposal is submitted for
approval, the plans are reviewed by the 40 Committee, the
special interdepartmental group chaired by the President's
National Security Advisor. Thus, the desire of the President
or his advisor to move secretly to influence the internal
38
The CIA and the Cult of Intelligence
events of another country is frequently the stimulus that
either sparks the CIA into action or permits its operators to
launch a dubious operation. Only then does the apparatus
cet into motion; only then do the analysts become meaningless.
But "only then" means "almost always."
Tactics
In his talk at the Council on Foreign Relations, Bissell listed
eight types of covert action, eight different ways that the
CIA intervenes in the domestic affairs of other nations:
(1) political advice and counsel; (2) subsidies to an
individual; (3) financial support and "technical assistance"
to political parties; (4) support of private organizations,
including labor unions, business firms, cooperatives, etc.;
(S) covert propaganda; (6) "private" trainingof individu-
als and exchange of persons; (7) economic operations;
and (8) paramilitary [or] political action operations de-
signed to overthrow or to support a regime (like the
Bay of Pigs and the program in Laos). These operations
can be classified in various ways: by the degree and type
of secrecy required by their legality, and. perhaps, by
their benign or hostile character.
Bissell's fifth and eighth categories — covert propaganda
and paramilitary operations — are so large, so important, that
they will be discussed at length in later chapters; they are. as
well, somewhat self-defining. But the other six categories
need some explanation at this point.
The first three categories — political advice and counsel,
subsidies to an individual, and flnancial support and techni-
cal assistance to political parties — are usually so closely re-
lated that they are nearly impossible to separate.
8 LINES DELETED
The reporters who covered that affair on April 10, 1971,
apparently failed to notice anything unusual about the guests.
Seated in the State Dining Room at long white tables form-
ing a large E was the usual assortment of foreign dignitaries,
high U.S. government officials, and corporate executives
The Clandesiine Theory
39
who had become fixtures at such occasions during the
Nixon years. The guest list supplied by the White House
Press office gave the titles and positions for almost all
the diners.
19 Vz LINES DELETED
years later, he wzs elected mayor of West Berlin. Through-
out thi.s period,
8 '/> LINES DELETED
He was a hard-working politician in Allied-occupied Berlin,
and his goal of making the Social Democratic party a viable
alternative to communism
15 LINES DELETED
And that evening after dinner, singer Pearl Bailey entertained
the White House crowd in the East Room. The Washington
Post reported the next day that she had "rocked" the White
House. During the same Cold War years . . . the CIA . . .
was also secretly funding and providing technical assistance
. . . to the Christian Democratic parly . . . in Italy. Most of
these payments were terminated in the 1950s, . . .
In certain countries where the CIA has been particularly
active, the agency's chief of station (COS) maintains closer
ties with the head of state than does the U.S. ambassador.
Usually, the ambassador is kept informed of the business
transacted between the COS (who is officially subordinate to
the ambassador) and the head of state (to whom the ambas-
sador is officially accredited as the personal representative of
the President of the United States). But Bissell mentioned
cases in which the CIA's relationship with the local head of
state was so special that the American ambassador was not
informed of any of the details, because either the Secretary
of State or the head of the host government preferred that
the ambassador be kept ignorant of the relationships.
A notable example of such a "special relationship" is Iran,
where a CIA organized coup d'etat restored the Shah to
power in 1953. . . .
Still another example of a country where the CIA enjoys
a special relationship is Nationalist China. In Taiwan, however.
40
The CIA and the Cult of Intelligence
the CIA's link is not with President Chiang Kai-shek, but
with his son and heir apparent. Premier Chiang Chingkuo.
One former CIA chief of station, Ray Cline, until late 1973
the State Department's Director of Intelligence and Research,
became something of a legend within the Clandestine Ser-
vices because of his frequent all-night drinking bouts with
the younger Chiang.
Over the years, the CIA closely collaborated with the Na-
tionalists . . . to use Taiwan at a base for U-2 flights (flown
over China by Nationalist pilots trained in the United States),
electronic surveillance . . . and such covert action programs as
propaganda and disinformation aimed at China during the
Cultural Revolution
In South Vietnam, Ambassador Ellsworth Bunker insisted
on personally conducting all important meetings with Presi-
dent Thieu; sometimes Bunker was accompanied by the CIA
chief when there was agency business to be discussed. But
there has been another CIA officer in Saigon who has known
Thieu for many years and who has retained access to the
Vietnamese President. According to a former assistant to
Ambassador Bunker, this CIA officer has served as conduit
between Thieu and the American government when a formal
meeting is not desired or when Thieu wishes to float an idea.
41 LINES DELETED
Each man has been thought by the agency to represent a
strong anti-communist force that would maintain stability in
a potentially volatile country.
Generally speaking, the CIA's ties with foreign political
leaders who receive advice and money from the agency are
extremely delicate. The CIA is interested in moving the
leader and, through him, his party and country into policies
to the advantage of the United States. In most countries of
the Third World, the United States policy is usually to
maintain the status quo. so most subsidies are designed to
strengthen the political base of those in power. The foreign
leader who receives money from the CIA is typically further-
ing both his own career and, presumably, what he believes
are the legitimate aims of his country. But even that pre-
sumption is shaky; any politician's ability to rationalize his
actions probably increases once he has made the decision to
accept such funds.
The Clandestine Theory
41
Extensive CIA involvement with private institutions at home
and overseas (Bissell's fourth category of covert-action tactics)
is one of the few aspects of the agency's covert-action effort
to have received a good deal of public attention. The l%7
expose by Ramparts magazine of the CIA's clandestine con-
nections with the National Student Association was quickly
followed by a flurry of articles in the press concerning agency
subsidies to scores of other organizations. Some of these
institutions, particularly those used as conduits for covert
funds, were under direct CIA control. Others simply were
financed by the agency and steered toward policies that it
favored through the manipulation of only a few of the
organization's key personnel. Sam Brown, a former head of
the National Student Association's National Supervisory Pol-
icy Board and later a leader in the 1968 McCarthy campaign
and in the anti-war movement, told David Wise and Thomas
B. Ross that in the case of the NSA, the CIA would select
one or two association officers as its contacts. These officers
were told that they should be aware of certain secrets and
were asked to sign an oath pledging silence. "Then," Brown
said,
they were told. "You are employed by the CIA." At
that point they were trapped, having signed a statement
not to divulge anything. . . . This is the part of the thing
that I found to be most disgusting and horrible. People
were duped into this relationship with the CIA, a rela-
tionship from which there was no out.
Not all the student leaders recruited over the years by the
CIA, however, were displeased with the arrangement. Some
later joined the agency formally as clandestine operatives,
and one rose to become executive assistant to Director Rich-
ard Helms. It was this same man who sometimes posed as an
official of the Agency for International Development to
entrap unsuspecting NSA officers, revealing his "cover" only
after extracting pledges of secrecy and even NSA commit-
ments to cooperate with specific CIA programs.
Tom Braden, who headed the CIA's International Organiza-
tions Division from 1930 to 1954 when that component of the
Clandestine Services was responsible for subsidizing private
42 The CIA and the Cull of Intelligence
organizations, described his own experiences in a 1967 Saturday
Evening Post article entitled "I'm Glad the CIA is 'Immoral' ":
It was my idea to give the SIS.OOO to Irving Brown [of
the American Federation of Labor). He needed it to
pay off his strong-arm squads in Mediterranean ports,
so that American supplies could be unloaded against the
opposition of Communist dock workers ... At [Victor
Reuther's) request, I went to Detroit one morning and
gave Walter [Reuther] $50,000 in $50 bills. Victor spent
the money, mostly in West Germany, to bolster labor
unions there. . . .
I remember the enormous joy I got when the Boston
Symphony Orchestra won more acclaim for the U.S. in
Paris than John Foster Dulles or Dwight D. Eisenhower
could have bought with a hundred speeches. And then
there was Encounter, the magazine published in En-
gland and dedicated to the proposition that cultural
achievement and political freedom were interdependent.
Money for both the orchestra's tour and the magazine's
publication came from the CIA, and few outside of the
CIA knew about it. We had placed one agent in a
Europe-based organization of intellectuals called the
Congress for Cultural Freedom. Another agent became
an editor of Encounter. The agents could not only pro-
pose anti-Communist programs to the official leaders of
the organizations but they could also suggest ways and
means to solve the inevitable budgetary problems. Why
not see if the needed money could be obtained from
"American foundations"? As the agents knew, the CIA-
financed foundations were quite generous when it came
to the national interest.
The CIA's culture-loving, optimistic, freewheeling operators,
however, made serious tactical errors in funding these
"private" institutions. Over the years, the agency became
involved with so many groups that direct supervision and
accounting were not always possible. Moreover, the agency
violated a fundamental rule of intelligence in not carefully
separating the operations of each organization from all the
others. Thus, when the first disclosures of CIA involvement
were published early in 1%7, enterprising journalists found
that the financing arrangements and the conduit foundations
The Clandestine Theory
43
were so intertwined and over-used that still other groups
which had been receiving CIA funds could be tracked down.
Bissell acknowledged this sloppiness of technique when he
said, "... it is very clear that we should have had greater
compartmenting of operations."
In the aftermath of the disclosures. President Johnson
appointed a special committee consisting of Under Secretary
of State Nicholas Katzenbach as chairman, CIA Director
Richard Helms, and HEW Secretary John Gardner to study
the CIA's relationship with private organizations. On March
29, 1967, the committee unanimously recommended — and the
President accepted as national policy — that: "No federal
agency shall provide any covert financial assistance or support,
direct or indirect, to any of the nation's educational or
private voluntary organizations." The report said that excep-
tions to this policy might be granted in case of "overriding
national security interests." but that no organizations then
being subsidized fitted this category. The Katzenbach com-
mittee noted that it expected the CIA largely, if not entirely,
to terminate its ties with private organizations by the end of
1967.
Yet, a year later Richard Bissell told the Council on
Foreign Relations;
If the Agency is to be effective, it will have to make use
of private institutions on an expanding scale, though
those relations which have "blown" cannot be resurrected.
We need to operate under deeper cover, with increased
attention to the use of "cut-outs" [i.e., intermediaries).
CIA's interface with the rest of the world needs to be
better protected. If various groups hadn't been aware of
the source of their funding, the damage subsequent to
disclosure might have been far less than occurred. The
CIA interface with various private groups, including
business and student groups, must be remedied.
Bissell's comments seemed to be in direct contradiction to
the official U.S. government policy established by the
President. But Bissell, no longer a CIA officer, wasn't chal-
lenging presidential authority, and his audience understood
that, just as it understood what, indeed, the Katzenbach
committee had recommended. Bissell was merely reflecting
rhp a^nt^ra] vipuu wirhi'n rhp PI A nnrl rhp riilr nf inrplliopnrp
44
The CIA and the Cult of Jnielligence
that President Johnson had been pressured by liberals and
the press into taking some action to reduce the agency's
involvement with private groups; that by naming Katzenbach
(then considered by the CIA to be a "friend") as chairman
of the committee and by making CIA Director Helms the
second of its three members, the President was stacking the
deck in the CIA's favor; that the agency certainly could be
criticized for its lack of professional skill in so sloppily fund-
ing the private groups; but that, essentially, the President
did not wish to change appreciably the CIA's covert-action
programs.
Once the Katzenbach report appeared, the CIA arranged
secret exceptions to the much-heralded new policy. Two
CIA broadcasting stations. Radio Free Europe and Radio
Liberty, which together received more than $30 million annu-
ally in CIA funds, were immediately placed outside the
restrictions of the presidential order. And the CIA delayed
withdrawing its support for other organizations whose agency
ties had been exposed until new forms of financing them
could be developed. Thus, as late as 1970 the CIA was still
subsidi/ing a major international youth organization through
a penetration who was one of the organization's ofUcers. In
some cases, "severance payments" were made that could
keep an organization afloat for years.
Although the CIA had been widely funding foreign labor
unions for more than fifteen years and some of the agency's
labor activities were revealed in Tom Braden's Saturday
Evening Post article, the Katzenbach committee did not
specify unions as the type of organizations the CIA was
barred from financing. At the 1968 Council on Foreign Rela-
tions meeting at which Bissell spoke, Meyer Bernstein, the
Steelworkers' Union's Director of International Labor Affairs,
commented:
the turn of events has been unexpected. First, there
hasn't been any real problem with international labor
programs. Indeed, there has been an increase in de-
mand for U.S. labor programs and the strain on our
capacity has been embarrassing. Formerly, these foreign
labor unions knew we were short of funds, but now they
all assume we have secret CIA money, and they ask for
more help.
The Clandestine Theory 45
Worse yet. Vic Reuther, who had been alleging that
others were receiving CIA money, and whose brother's
receipt of 550,000 from CIA in old bills was subse-
quently disclosed by Tom Braden, still goes on with his
charges that the AET--CIO has taken CIA money. Here
again, no one seems to listen. "The net result has been
as close to zero as possible. We've come to accept CIA,
like sin." So, for example, British Guiana's [Guyana]
labor unions were supported through CIA conduits, but
now they ask for more assistance than before. So, our
expectations to the contrary, there has been almost no
damage.
In Vietnam, enthusiastic officials of the U.S. embassy in
Saigon were fond of saying during the late 1960s that Tran
Ngoc Buu was the Samuel Gompers of the Vietnamese labor
movement. They did not say — and most probably did not
know —
4 LINES DELETED
Bissell also identified " 'private' training of individuals
and exchange of persons" as a form of covert action:
Often activities have been initiated through CIA chan-
nels because they could be started more quickly and
informally but do not inherently need to be secret. An
example might be certain exchange-of-persons programs
designed to identify potential political leaders and give
them some exposure to the United States. It should be
noted, however, that many such innocent programs are
more effective if carried out by private auspices than if
supported officially by the United States Government.
They do not need to be covert but if legitimate private
entities such as the foundations do not initiate them,
there may be no way to get them done except by covert
support to "front" organizations.
He was referring to the so-called people-to-people ex-
change programs, most of which are funded openly by the
State Department, the Agency for International Development,
the U.S. Information Agency, and various private organiza-
tions and foundations. But the CIA has also been involved
46 The CIA and the Cult of Intelligence
to a lesser extent, and has brought foreigners to the United
States with funds secretly supplied to conduit organizations.
Oh occasion, the agency will sponsor the training of foreign
ofTiciais at the facilities of another government agency. A
favorite site is AID'S International Police Academy in
Washington. The academy is operated by AID'S Public Safely
(police) Division, which regularly Knpplies cover to CIA
operators aN over the world. And the CIA takes advantage
of exchange programs to recruit agents. While a systematic
approach is not followed, the agency considers foreigners
visiting the United States to be legitimate targets for
recruitment.
TTie CIA has undertaken comparatively few economic covert-
action programs (Bissell's seventh category) over the years,
preferring the more direct approach of paramilitary opera-
tions or propaganda. And those economic programs attempted
by the agency have not been notably successful. During the
mid-1960s Japanese investors were used in an effort to build
up the South Vietnamese economy, because American com-
panies tended to shy away from making substantial invest-
ments in Vietnam. The U.S. government hoped that the
Japanese would fill the void at least partially, and eventually
lighten U.S. aid requirements. TTius, CIA representatives
promised certain Japanese businessmen that the agency would
supply the investment capital if the Japanese would front for
the operation and supply the technical expertise for large
commercial farms. After long and detailed negotiations, the
deal faltered and then failed.
A few years earlier the CIA had tried to disrupt Cuba's
sugar trade as part of its program to undercut Fidel Castro's
regime. At one point the Clandestine Services operatives
proposed that the CIA purchase large amounts of sugar and
then dump it in a certain foreign country so as to destroy the
market for Cuban sugar. This plan also fell through, but a
more serious attack on Cuban sugar occurred in August 1962
when a British freighter under lease to the Soviets docked in
Puerto Rico for repairs. TTie freighter, carrying Cuban sugar
destined for the Soviet Union, was placed in a bonded
warehouse while the ship was in dry dock. CIA agents broke
into the warehouse and contaminated the sugar with a non-
poisonous but unpalatable substance.
The Clandestine Theory
47
As pointed out earlier, one of the advantages a secret agency
like the CIA provides to a President is the unique pretext of
being able to disclaim responsibility for its actions. Thus, a
President can direct or approve high-risk clandestine opera-
tions such as a manned overflight of the Soviet Union on the
eve of a summit conference, a Bay of Pigs invasion, penetra-
tion and manipulation of private youth, labor, or cultural
organizations, paramilitary adventures in Southeast Asia, or
intervention in the domestic politics of Chile without openly
accepting the consequences of these decisions. If the clandes-
tine operations are successful — good. If they fail or backfire,
then usually all the President and his staff need do to avoid
culpability is to blame the CIA.
In no instance has a President of the United States ever
made a serious attempt to review or revamp the covert
practices of the CIA. Minor alterations in operational meth-
ods and techniques have been carried out, but no basic
changes in policy or practice have ever been demanded by
the White House. And this is not surprising: Presidents like
the CIA. It does their dirty work — work that might not
otherwise be "do-able." When the agency fails or blunders,
all the President need do is to deny, scold, or threaten.
For the CIA's part, being the focus of presidential blame
is an occupational hazard, but one hardly worth worrying
about. It is merely an aspect of the cover behind which the
agency operates. Like the other aspects of cover, it is part of
a deception. The CIA fully realizes that it is too important
to the government and the American political aristocracy for
any President to do more than tinker with it. The CIA shrugs
off its blunders and proceeds to devise new operations,
secure in the knowledge that the White House usually can-
not resist its offerings, particularly covert action — covert
action that dominates, that determines, that defines the shape
and purpose of the CIA. America's leaders have not yet
reached the point where they are willing to forsake interven-
tion in the internal affairs of other countries and let events
naturally run their course. There still is a widely held belief
in this country that America has the right and the responsibil-
ity to become involved in the internal political processes of
foreign nations, and while faith in this belief and that of
doctrinaire anti-communism may have been somewhat shaken
in the last decade, it was Henry Kissinger, who in 1970 when
confronted with the prospect of a democratically elected Marx-
48
The CIA and the Cult of Inulligence
isi president in Chile, still reacted by seeking covert ways to
prevent such a development. In so doing he expressed the
view of the cult of intelligence by announcing, "I don't see
why we need to stand by and watch a country go Communist
due to the irresponsibility of its own people. "
3.
THE CIA AND THE
INTELLIGENCE COMMUNITY
It is (he (ask of (he Director of Central Intelligence,
utilizing his influence in the various interdepart-
mental mechanisms, to create out of these diverse
components a truly national estimate, useful to the
national interest and not just to a particular bureau-
cratic prererencc. This is not an easy task.
— HARRY HOWr RANSOM
The Inlelligrnce Establishmeni
The CIA is big, very big. Officially, it has authorized man-
power of 16,500, and an authorized budget of $750 million —
and even those figures are jealously guarded, generally made
available only to Congress. Yet, regardless of its official size
and cost, the agency is far larger and more affluent than
these figures indicate.
The CIA itself does not even know how many people
work for it. The 16,500 figure does not reflect the tens of
thousands who serve under contract (mercenaries, agents,
consultants, etc.) or who work for the agency's proprietary
companies.* Past efforts to total up the number of foreign
agents have never resulted in precise figures because of the
inordinate secrecy and compartmentalization practiced by
the Clandestine Services. Sloppy record-keeping — often de-
liberate on the part of the operators "for security pur-
poses" — is also a factor. There are one-time agents hired for
specific missions, contract agents who serve for extended
periods of time, and career agents who spend their entire
working lives secretly employed by the CIA. In some
instances, contract agents are retained long after their useful-
ness has passed, but usually are known only to the case
'Nor does the figure Include (he guard force which protects ihe CIA's build-
ings and installations, (he maintenance and char force, or the people who run
(he agency's cafe(erias. The General Services Adminis(ration employs most of
these personnel.
50
The CIA and ihe Cult of Intelligence
officers with whom they deal. One of the Watergate burglars,
Eugenio Martinez, was in this category. When he was caught
inside the Watergate on that day in June 1972, he still was
receiving a SlOO-a-month stipend from the agency for work
apparently unrelated to his covert assignment for the Com-
mittee to Re-Elect the President. The CIA claims to have
since dropped him from the payroll.
A good chunk of the agency's annual operational funds,
called "project money," is wasted in this fashion. Payments
to no-longer-productive agents are justified on several grounds:
the need to maintain secrecy about their operations even
though these occurred years ago; the vague hope that such
agents will again prove to be useful (operators are always
reluctant to give up an asset, even a useless one), and the
claim that the agency has a commitment to its old allies — a
phenomenon known in the CIA as "emotional attachment."
It is the last justification that carries the most weight within
the agency. Thus, hundreds — perhaps thousands—of former
Cuban, East European, and other minor clandestine agents
are still on the CIA payroll, at an annual cost to the taxpay-
ers of hundreds of thousands, if not millions, of dollars a
year.
All mercenaries and many field-operations officers used in
CIA paramilitary activities are also contractees and, therefore,
are not reflected in the agency's authorized manpower level.
The records kept on these soldiers of fortune are at best only
gross approximations. In Laos and Vietnam, for example,
the Clandestine Services had a fairly clear idea of how many
local tribesmen were in its pay. but the operators were never
quite certain of the total number of mercenaries they were
financing through the agency's numerous support programs,
some of which were fronted for by the Department of
Defense, the Agency for International Development, and, of
course, the CIA proprietary. Air America.
Private individuals under contract to— or in confidential
contract with — the agency for a wide variety of tasks other
than soldiering or spying are also left out of the personnel
totals, and complete records of their employment are not
kept in any single place.* In 1967, however, when the CIA's
'Atlcmpls to cumpuicrizc the complete CIA employment list were frustrated
and evcniuiilly scuttled hy Director Helms, who viewed the effort as a poten-
tial breach of operational security.
The CIA and the Intelligence Community 51
role on American campuses was under close scrutiny be-
cause of the embarrassing National Student Association
revelations, Helms asked his staff to find out just how many
university personnel were under secret contract to the CIA.
After a few days of investigation, senior CIA officers re-
ported back that they could not find the answer. Helms
immediately ordered a full study of the situation, and after
more than a month of searching records all over the agency,
a report was handed in to Helms listmg hundreds of profes-
sors and administrators on over a hundred campuses. But
the staff officers who compiled the report knew that their
work was incomplete . Within weeks, another campus connec-
tion was exposed in the press. The contact was not on the
list that had been compiled for the Director.
Just as difficult as adding up the number of agency
contractees is the task of figuring out how many people work
for its proprietaries. CIA headquarters, for instance, has
never been able to compute exactly the number of planes
flown by the airlines it owns, and personnel figures for the
proprietaries are similarly imprecise. An agency holding
company, the Pacific Corporation, including Air America
and Air Asia, alone accounts for almost 20,000 people, more
than the entire workforce of the parent CIA. For years this
vast activity was dominated and controlled by one contract
agent, George Doole, who later was elevated to the rank of
a career officer. Even then his operation was supervised,
part time, by only a single senior officer who lamented that
he did not know "what the hell was going on."
Well aware that the agency is two or three times as large as
it appears to be, the CIA's leadership has consistently sought
to downplay its size. During the directorship of Richard Helms,
when the agency had a career-personnel ceiling of 18,000, CIA
administrative officers were careful to hold the employee
totals to 200 or 300 people below the authorized complement.
Even at the height of the Vietnam war, while most national-
security agencies were increasing their number of employees,
the CIA handled its increased needs through secret contracts,
thus giving a deceptive impression of personnel leanness.
Other bureaucratic gambits were used in a similar way to
keep the agency below the 18,000 ceiling. Senior officers
were often rehired on contract immediately after they retired
and started to draw government pensions. Overseas, agency
wives were often put on contract to perform secretarial duties.
52
The CIA and the Cull of Intelligence
Size and Cost of the CIA
(Approximate)
Personnel S Millions
Office of the Director 4(K) 10
Clandestine Services fi.tXW 44()
(Directorate of Operations)
Espionage/Counterespionage (4.2(N)) (1X())
Covert Action (l.WK)) (260)
Directorate of Management
and Services ^ 5.3(K) 110
Communications (2,(KX)) (70)
Other Supp<irt (3.3(K)) (40)
Directorate of Intelligence 3,5(X) 70
Analysis (I.2(X)) (50)
Information Processing (2.3(X)) (20)
Directorate of Science
and Technology 1.300 120
Technical Collection (l.(XX)) (50)
Research and Development (3(X)) (70)
16.5(K)' 750"
Just as the personnel figure is deceptive, so does the
budget figure not account for a great part of the CIA's
campaign chest. The agency's proprietaries are often money-
making enterprises, and thus provide "free" services to the
parent organization. The prime examples of this phenome-
non are the airlines (Air America, Air Asia, and others)
organized under the CIA holding company, the Pacific
Corporation, which have grown bigger than the CIA itself
by conducting as much private business as possible and con-
tinually reinvesting the profits. These companies generate
revenues in the tens of millions of dollars each year, but the
"Nearly 5.()(lll CIA pcnsiinnci strvc Dvcrscas. Ihc marjoriiy (W(-7n percent)
being mcmhcri uf ihc ClandcMinc Services. Of (he remainder. fm»l arc
ciimmunicaiions iifnccrs and other opcraliimal !>upp<>rt personnel.
"DiKi not include Ihc Director's Special Contingency Fund.
The CIA and the Intelligence Community
53
figures are imprecise because detailed accounting of their
activities is not normally required by agency bookkeepers.
For all practical purposes, the proprietaries conduct their
own financial affairs with a minimum of oversight from CIA
headquarters. Only when a proprietary is in need of funds
for, say, expansion of its fleet of planes, does it request
agency money. Otherwise, it is free to use its profits in any
way it sees fit. In this atmosphere, the proprietaries tend to
take on lives of their own, and several have grown too big
and too independent to be either controlled from or dis-
solved by headquarters.
Similarly, the CIA's annual budget does not show the
Pentagon's annual contribution to the agency, amounting to
hundreds of millions of dollars, to fund certain major techni-
cal espionage programs and some particularly e.xpensive clan-
destine activities. For example, the CIA's Science and
Technology Directorate has an annual budget of only a little
more than SlOO miHion, but it actually spends well over $500
million a year. The ditTerence is funded largely by the Air
Force, which underwrites the national overhead-reconnaissance
effort for the entire U.S. intelligence community. Moreover,
the Clandestine Services waged a "secret" war in Laos for
more than a decade at an annual cost to the government of
approximately $500 million. Yet, the CIA itself financed less
than 10 percent of this amount each year. The bulk of the
expense was paid for by other federal agencies, mostly the
Defense Department but also the Agency for International
Development.
Fully aware of these additional sources of revenue, the
CIA's chief of planning and programming reverently ob-
served a few years ago that the director does not operate a
mere mullimillion-doWar agency but actually runs a mulli-
biltion-doWaf conglomerate — with virtually no outside over-
sight.
In terms of financial assets, the CIA is not only more
affluent than its official annual budget reflects, it is one of
the few federal agencies that have no shortage of funds. In
fact, the CIA has more money to spend that it needs. Since
its creation in 1947, the agency has ended almost every fiscal
year with a surplus — which it takes great pains to hide from
possible discovery by the Office of Management and Budget
(OMB) or by the congressional oversight subcommittees.
The risk of discovery is not high, however, since both the
54
The CIA and the Cult of Intelligence
OMB and the subcommittees are usually friendly and indul-
gent when dealing with the CIA. Yet, each year the agency's
bookkeepers, at the direction of the organization's top
leadership, transfer the excess funds to the accounts of the
CIA's major components with the understanding that the
money will be kept available if requested by the director's
office. Tliis practice of squirreling away these extra dollars
would seem particularly unnecessary beaiuse the agency always
has some S50 to SlOO million on call for unanticipated costs
in a special account called the Director's Contingency Fund.
The Director's Contingency Fund was authorized by a
piece of legislation which is unique in the American system.
Under the Central Intelligence Agency Act of 1949, the Direc-
tor of Central Intelligence (DCI) was granted the privilege
of expending funds "without regard to the provisions of law
and regulations relating to the expenditure of Government
funds; and for objects of confidential, extraordinary, or emer-
gency nature, such expenditures to be accounted for solely
on the certificate of the Director. . . ." In the past, the Fund
4 LINES DELETED
But there have been times when the fund has been used for
the highly questionable purpose of paying expenses incurred
by other a|{encies of the government.
In 1967 Secretary of Defense Robert McNamara promised
Norwegian officials that the U.S. government would provide
them with some new air-defense equipment costing several
million dollars. McNamara subsequently learned the equip-
ment was not available in the Pentagon's inventories and would
have to be specially purchased for delivery to Norway. He was
also informed that, because of the high cost of the Vietnam
war (for which the Defense Department was then seeking a
supplemental appropriation from Congress), funds to procure
the air-defense equipment were not immediately at hand.
Further complications arose from the fact that the Secretary
was then engaged in a disagreement with some members of
Congress over the issue of foreign military aid. It was there-
fore decided not to openly request the funds for the small but
potentially sticky commitment to the Norwegians. Instead,
the Pentagon asked the CIA (with While House approval) to
supply the money needed for the ptifttiasc of air-defense equip-
ment. The fun<k were secretly transferred to the Defense.
The CIA and the Inttlli^cnce Community 55
5 Vi LINES DELETED
That same year President Johnson traveled to Piinta del
Este. a posh resort in Uruguay, for a meeting of the Organi-
zation of American States, lie entertained the attending
foreign leaders in a lavish manner which he apparently thought
befitted the President of the United States, and he freely
dispensed expensive gifts and souvenirs. In the process, LBJ
greatly exceeded the representational allowance that the State
Department had set aside for the conference. When the
department found itself in the embarrassing position of being
unable to cover the President's bills because of its tight
budget (due in part to the economics LBJ had been demand-
ing of the federal bureaucracy to help pay for the war in
Vietnam), it was reluctant to seek additional funds from
Congress. Representative John Rooney of Brooklyn, who
almost singlehandedly controlled Slate's appropriations, had
for years been a strong critic of representational funds (called
the "booze allowance") for America's diplomats. Rather
than face Rooney's wrath. State turned to the CIA. and the
Director's Contingency Fund was used to pay for the
President's fling at Punta del Este.
For some reason — perhaps because of the general view in
the CIA that its operations are above the law — the agency
has tended to play fiscal games that other government de-
partments would not dare engage in. One example concerns
the agency's use of its employee retirement fund, certain
agent and contract-personnel escrow accounts, and the CIA
credit union's capital, to play the stock market. With the
approval of the top CIA leadership, a small group of senior
agency officers has for years secretly supervised the manage-
ment of these funds and invested them in stocks, hoping to
turn a greater profit than normally would be earned through
the Treasury Department's traditional low-interest but safe
bank deposits and bond issues. Originally, the investment
group, consisting of CIA economists, accountants, and
lawyers, dealt with an established Boston brokerage house,
which made the final investment decisions. But several years
ago the Boston brokers proved too conservative to suit the
agency investors, some of whom were making fatter profits
with their personal portfolios. The CIA group decided it
would do much better by picking its own stocks, so the
brokerage house was reduced to doine onlv the actual stock
56
The CIA and the Cult of Intelligence
trading (still with a handsome commission, of course). Within
a matter of months the agency investors were earning bigger
profits than ever before. Presumably, the gains were plowed
back into the retirement, escrow, and credit-union funds.*
In 1%8, Senator Richard Russell of Georgia, then the
chairman of the Senate joint subcommittee for overseeing
the CIA's activities, privately informed Director Helms that
because of increasing skepticism among certain Senators about
the agency operations, it probably would be a good idea for
the CIA to arrange to have its financial procedures reviewed
by an independent authority. Thus, in Russell's view, poten-
tial Senate critics who might be considering making an issue
of the agency's special fiscal privileges would be undercut in
advance. Senator Russell suggested the names of a few pri-
vate individuals who might be willing to undertake such a
task on behalf of the CIA. After conferring with his senior
officers. Helms chose to ask Wilfred McNeil, at that time
the President of Grace Shipping Lines
3 LINES DELETED
to serve as the confidential reviewer of the agency's budget-
ary practices. McNeil, a former admiral and once comptrol-
ler for the Defense Department, was thought by Helms to
be ideally suited, politically and otherwise, for the assignment.
McNeil accepted the task and soon came to CIA headquar-
ters for a full briefing on the agency's most sensitive finan-
cial procedures — including an account of the methods used
for purchasing and laundering currency on the international
black market. He was told of the CIA's new planning,
programming, and budgeting system, modeled after the inno-
vations Robert McNamara had introduced at the Defense
Department. Agency experts explained to McNeil how funds
for new operations were authorized within the agency. He
'The invcslmeni practices of ihe CIA group in companies wiih overseas
holdinp open up some inlercsling questions about "insider" information.
Would the CIA group have sold Anaconda Copper short in 1970 when the
agency realized thai its coven efforts to prevent Salvador Allende from
assuming Ihe Presidency of Chile had failed? Or in 1973. when Director James
Schlesinger dedded to allnw William Broc. the former chief of the Oandes-
line Services' Western Hemisphere Divisjon. to testify before the Senate
Foreign Relations Committee and describe Ills role in trying to provoke
CIA action against Allende. might the investment group not have been
templed to dump its ITT stock (if it had any)?
The CIA and the Intelligence Community
57
learned that the agency maintained a sliding-scale system for
the approval of new projects or the fjeriodic renewal of
ongoing ones; that espionage operations costing up to SlU.OOO
could be okayed by operators in the field; and that progres-
sively more expensive operations necessitated brunch, division,
and Clandestine Services chief approval until, finally, opera-
tions costing over SI(XJ,U(K) were authorized personally by
the Director. McNeil also was briefed on the agency's inter-
nal auditing system to prevent field operatives from misusing
secret funds.
McNeil's reaction to his long and detailed briefing was to
express surprise at the scope of the CIA's Tinancial system
and to praise the accounting practices used. When asked
where and when he would like to begin his work in depth,
he politely demurred and departed — never to return. A month
or so later a CIA officer working in the Director's office
learned that McNeil had had certain misgivings about the
project and had sought the advice of former agency Director
William Raborn. who had his own doubts about the reliabil-
ity of the CIA's top career officers. Raborn had apparently
discouraged McNeil from becoming involved in such a review.
But as far as the CIA was concerned. Senator Russell's
request for an independent audit had been carried out. since
the agency's fiscal practices had been looked over by a
qualified outsider and found to be in no need of improvement.
The whole matter was then dropped.
Organization
The CIA is neatly organized into five distinct parts, a rela-
tively small office of the Director and four functional
directorates, the largest of which is the Directorate of Opera-
tions (known inside the agency as the Clandestine Services).
The executive suite houses the CIA's only two political
appointees, the Director of Central Intelligence (DCI) and
the Deputy Director (DDCI). and their immediate staffs.
Included organizationally, but not physically, in the Office of
the Director are two components that assist the DCI in his
role as head of the U.S. intelligence community. One is a
small group of senior analysts, drawn from the CIA and the
other agencies of the community, which prepares the "blue
books," or National Intelligence Estimates on such subjects
58
The CIA and the Cull of InUlligence
as Soviet strategic defense capabilities, Chinese long-range
missile developments, and the political outlook for Chile.*
The other is the Intelligence Resources Advisory Committee,
a group created in 1971, which provides staff assistance to the
Director in his efforts to manage and streamline the S6-
billion intelligence community.
The Intelligence Resources Advisory Committee, long a
dream of those officers who believe the U.S. intelligence
community to be too big and inefficient, has thus far proven
to be something of a nightmare. Instead of eliminating waste-
ful and redundant activities within U.S. intelligence, it has
been turned into a vehicle for the military intelligence agen-
cies to justify and expand their already overly ambitious
collection programs. Likewise, the recent revamping of the
Board of National Estimates, under present Director Wil-
liam Colby, has been characterized by some experienced
hands as "a sellout" to Pentagon power, caused in part by
the political pressures of Henry Kissinger's National Security
Council staff. Under Colby, the board has been greatly
reduced in both prestige and independence, and has been
brought under the stifling influence of military men whose
first allegiance is to their parent services rather than to the
production of objective, balanced intelligence assessments
for the policy-makers.
The other components of the Office of the Director in-
clude those traditionally found in governmental bureaucracies:
press officers, congressional liaison, legal counsel, and so
on. Only two merit special note: the Cable Secretariat and
the Historical Staff. The former was established in 1950 at
the insistence of the Director, General Walter Bedell Smith.
When Smith, an experienced military staff officer, learned
that agency communications, especially those between head-
quarters and the covert field stations and bases, were con-
trolled by the Clandestine Services, he immediately demanded
a change in the system. "The operators are not going to
decide what secret information I will see or not see," he is
reported to have said. TTius, the Cable Secretariat, or mes-
sage center, was put under the Director's immediate authority.
These senior analysts arc called National Intelligence Officers (and some-
times "(he Wise Men" by their colleagues wiihin the community) The group
has replaced the Board of National Estimates, which was a larger and more
formalized body of senior officeif who oversaw the preparations of national
estimates.
The CIA and the Intelligence Community
59
Since then, however, (he operators have found other ways,
when it is thought necessary, of keeping their most sensitive
communications from going outside the Clandestine Services.
The Historical Staff represents one of the CIA's more
clever attempts to mainlain the secrecy on which the organi-
zation thrives. Several years ago the agency began to invite
retiring officers to spend an additional year or two with the
agency — on contract, at regular pay — writing their official
memoirs. The product of their effort is, of course, highly
classified and tightly restricted. In the agency's eyes, this is
far better than having former officers openly publish what
really happened during their careers with the CIA.
The largest of the agency's directorates is the Directorate of
Operations, or the Clandestine Services, which has about
6,000 professionals and clericals. The ratio between pro-
fessionals, mostly operations officers, and clericals, largely
secretaries, is roughly two to one. Approximately 45 percent
of the Clandestine Services personnel is stationed overseas,
the vast majority using official cover — i.e., posing as repre-
sentatives of the State or Defense department. About two
out of three of the people in the Clandestine Services are
engaged in general intelligence activities — liaison, espionage,
and counterespionage — the remainder concentrating on vari-
ous forms of covert action. Yet despite the smaller number
of personnel working on covert action, these interventions in
the internal affairs of other countries cost about half again as
much as spying and counterspying (S260 million v. $180 mil-
lion annually). The greater expense for covert action is ex-
plained by the high costs of paying for paramilitary operations
and subsidizing political parties, labor unions, and other
international groups.
The Clandestine Services is broken down into fifteen sepa-
rate components, but its actual operating patterns do not
follow the neat lines of an organizational chart. Exceptions
are the rule. Certain clandestine activities which would seem
to an outsider to be logically the responsibility of one compo-
nent are often carried out by another — because of political
sensitivity, because of an assumed need for even greater
secrecy than usual, because of bureaucratic compartmenta-
lization, or simply because things have always been done
that way.
The bulk of the Clandestine Services' personnel, about
60
The CIA and the Cult of Intelligence
Oif anization ol the CIA
GCHTkl
] Itlcrpnl
Ofkt af
C»«rr
The CIA and the Intelligence Community
61
■•■If*]
5u<
Eiri
J
62
The CIA and the Cult of Intelligence
4,800 people, work in the so-called area divisions, both at
headquarters and overseas. These divisions correspond roughly
to the State Department's geographic bureaus — a logical
breakdown, since most CIA operators in foreign countries
work under State cover. The largest area division is the Far
East (with about 1,500 p>eople), followed in order of descend-
ing size by Europe (Western Europe only). Western Hemi-
sphere (Latin America plus Canada), Near East, Soviet Bloc
(Eastern Europe), and Africa (with only 300 staff). The
chain of command goes from the head of the Clandestine
Services to the chiefs of the area divisions, then overseas to
the chiefs of stations (COS) and their chiefs of bases (COB).
The CIA's stations and bases around the world serve as
the principal headquarters of covert activity in the country in
which each is located. The station is usually housed in the
U.S. embassy in the capital city, while bases are in other
major cities or sometimes on American or foreign military
bases. For example, in West Germany, the CIA's largest site
for operations, the station is located in Bonn; the chief of
station is on the staff of the American ambassador. There
are subordinate bases in ( DELETED ) and a few other
cities, along with several bases under American military
cover scattered throughout the German countryside.
The Domestic Operations Division of Clandestine Services,
is, in essence, an area division, but it conducts its mysterious
clandestine activities in the United States, not overseas. Its
chief — like the other area-division chiefs, the civilian equiva-
lent of a two- or three-star general — works out of an office
in downtown Washington, within two blocks of the White
House. Under the Washington station are bases located in
other major American cities.
Also in the Clandestine Services are three staffs. Foreign
Intelligence (espionage). Counterintelligence (counterespio-
nage), and Covert Action, which oversee operational policy
in their respective specialities and provide assistance to the
area divisions and the field elements. For instance, in an
operation to plant a slanted news story in a Chilean
newspaper, propaganda experts on the Covert Action Staff
might devise an article in cooperation with the Chilean desk of
the Western Hemisphere Division. A CIA proprietary', like
( DELETED ) might be used to write and transmit the
story to Chile so it would not be directly attributable to the
agency, and then a clandestine operator working out of the
The CIA and the Intelligence Community
63
American embassy in Santiago might work through one of
his penetration agents in the local press to ensure that the
article is reprinted. While most CIA operations abroad are
carried out through the area divisions, the operational staffs,
particularly the Covert Action Staff, also conduct indepen-
dent activities.
The Special Operations Division is something of a hybrid
between the area divisions and the operational staffs. Its
main function is to provide the assets for paramilitary
operations, largely the contracted manpower (mercenaries
or military men on loan), the materiel, and the expertise to
get the job done. Its operations, however, are organization-
ally under the station chief in the country where they are
located.
The remaining three components of the Clandestine Ser-
vices provide technical assistance to the operational com-
ponents. These three are: the Missions and Programs Staff,
which does much of the bureaucratic planning and budgeting
for the Clandestine Services and which writes up the justifica-
tion for covert operations submitted for approval to the 40
Committee; the Operational Services Division, which among
other things sets up cover arrangements for clandestine
officers; and the Technical Services Division, which pro-
duces in its own laboratories the gimmicks of the spy trade —
the disguises, miniature cameras, tape recorders, secret writing
kits, and the like.
The Directorate of Management and Services (formerly the
Directorate of Support) is the CIA's administrative and house-
keeping part. However, most of its budget and personnel is
devoted to assisting the Clandestine Services in carrying out
covert operations. (This directorate is sometimes referred to
within the agency as the Clandestine Services' "slave"
directorate.) Various forms of support are also provided to
the Directorate of Intelligence and the Directorate of Sci-
ence and Technology, but the needs of these two compo-
nents for anything beyond routine administrative tasks are
generally minimal. Covert operations, however, require a
large support effort, and the M&S Directorate, in addition
to providing normal administrative assistance, contributes in
such areas as communications, logistics, and training.
The M&S Directorate's OfTice of Finance, for example,
maintains field units in Hong Kong, Beirut, Buenos Aires,
64
The CIA and the Cult o f Intelligence
and Geneva with easy access to the international money
markets. The Office of Finance tries to keep a ready inven-
tory of the world's currencies on hand for future clandestine
operations. Many of the purchases are made in illegal black
markets where certain currencies are available at bargain
rates. In some instances, most notably in the case of the
South Vietnamese piaster, black-market purchases of a sin-
gle currency amount to millions of dollars a year.
The Office of Security provides physical protection for
clandestine installations at home and abroad and conducts
polygraph (lie detector) tests for all CIA employees and
contract personnel and most foreign agents. The Office of
Medical Services heals the sicknesses and illnesses (both
mental and physical) of CIA personnel by providing "cleared"
psychiatrists and physicians to treat agency officers; analyzes
prospective and already recruited agents, and prepares
"psychological profiles" of foreign leaders (and once, in
1971, at the request of the Watergate "plumbers," did a
"profile" of Daniel Ellsberg). The Office of Logistics oper-
ates the agency's weapons and other warehouses in the United
States and overseas, supplies normal office equipment and
household furniture, as well as the more esoteric clandestine
materiel to foreign stations and bases, and performs other
housekeeping chores. The Office of Communications, em-
ploying over 40 percent of the Directorate of Management
and Services's more than 5,000 career employees, maintains
facilities for secret communications between CIA headquar-
ters and the hundreds of stations and bases overseas. It also
provides the same services, on a reimbursable basis, for the
State Department and most of its embassies and consulates.
TYie Office of Training operates the agency's training facili-
ties at many locations around the United States, and a few
overseas. CThe Office of Communications, however, runs
2 LINES DELETED
The Office of Personnel handles the recruitment and record-
keeping for the CIA's career personnel.
Support functions are often vital for successful conduct of
covert operations, and a good support officer, like a good
supply sergeant in an army, is indispensable to a CIA station
or base. Once a station chief has found the right support
officer, one who can provide everything from housekeeping
The CIA and the Intelligence Community
65
to operational support, the two will often form a profes-
sional alliance and stay together as they move from post to
post during their careers. In some instances the senior sup-
port officer may even serve as the de facto second-in-command
because of his close relationship with the chief.
Together, the Clandestine Senices and the Directorate
for Management and Services constitute an agency within an
agency. These two components, like the largest and most
dangerous part of an iceberg, float along virtually unseen.
Their missions, methods, and personnel are quite different
from those of the CIA's other two directorates, which ac-
count for only less than a third of the agency's budget and
manpower. Yet the CIA — and particularly former Director
Richard Helms — has tried to convince the American public
that the analysts and technicians of the Directorates for
Intelligence and Science and Technology, the clean white tip
of the CIA iceberg, are the agency's key personnel.
The Directorate of Intelligence, with some 3,500 employees,
engages in two basic activities: first, the production of fin-
ished intelligence reports from the analysis of information
(both classified and unclassified); and second, the perfor-
mance of certain services of common concern for the benefit
of the whole intelligence community. Included in the latter
category are the agency's various reference services (e.g., a
huge computerized biographical library of foreign personalities,
another on foreign factories, and so on); the Foreign Broad-
casting Information Service (a worldwide radio and televi-
sion monitoring system); and the National Photographic
Interpretation Center (an organization, run in close coopera-
tion with the Pentagon, which analyzes photographs taken
from satellites and spy planes). About two thirds of the
Intelligence Directorate's $70 million annual budget is de-
voted to carrying out these services of common concern for
the government's entire national-security bureaucracy. Thus,
the State and Defense departments are spared the expense
of maintaining duplicate facilities, receiving from the CIA
finished intelligence in areas of interest to them. For example,
when there is a shift in the Soviet leadership, or a new
Chinese diplomat is posted to Washington, the Intelligence
Directorate routinely sends biographical information (usually
classified "secret") on the personalities involved to the other
government agencies. Similarly, the various State Depart-
66
The CI A and the Cult of Intelligence
ment bureaus (along with selected American academicians
and newspapers) regularly receive the agency's unclassified
transcripts of foreign radio and television broadcasts.
Most of the rest of the Intelligence Directorate's assets are
focused on political, economic, and strategic military research.
The agency's specialists produce both current intelligence —
reports and explanations on a daily basis of the world's
breaking events — and long-range analysis of trends, poten-
tial crisis areas, and other matters of interest to the govern-
ment's policy-makers. Turning out current intelligence re-
ports is akin to publishing a newspaper, and, in fact, the
Intelligence Directorate puts out daily and weekly publica-
tions which, except for their high security classifications, are
similar to work done by the American press. These regular
intelligence reports, along with special ones on topics like
corruption in South Vietnam or the prospects for the Soviet
wheat crop, are sent to hundreds of "consumers" in the
federal government. The primary consumer, however, is the
President, and he receives every morning a special publica-
tion called the President's Daily Brief. In the Johnson admin-
istration these reports frequently contained, in addition to
the normal intelligence fare, rather scandalous descriptions
of the private lives of certain world leaders, always avidly
read by the President.* The agency found, however, that in
the Nixon administration such items were not appreciated,
and the tone of the daily report was changed. Even so,
President Nixon and Henry Kissinger soon lost interest in
reading the publication; the task was relegated to lower-
ranking officials on the National Security Council staff.
Tlie fourth and newest of the CIA's directorates. Science
and Technology, also employs the smallest number of
personnel, about 1,300 people. It carries out functions such
as basic research and development, the operation of spy
satellites, and intelligence analysis in highly technical fields.
In addition to these activities, it also handles the bulk of the
agency's electronic data-processing (computer) work. While
the S&T Directorate keeps abreast of and does research
'President Johnson's laste in inlclligcnce was far from convenlional. A former
high Stale Deparlmcnl official tells of attending a meeting at the White House
and then staying on for a talk with the President afterward. LBJ proceeded to
play for him a tape recording (one of those presumably made by the FBI) of
Martin Luther King in a rather compromising situation.
The CIA and the Intelligence Community 67
work in a wide variety of scientific fields, its most important
successes have come in developing technical espionage
systems. The precursor of this directorate was instrumental
in the development of the U-2 and SR-71 spy planes. The
S&T experts have also made several brilliant breakthroughs
in the intelligence-satellite field. In the late 19S0s, when
Clandestine Services chief Richard Bissell encouraged the
technicians in their development of America's first photo-
reconnaissance satellite, they produced a model which was
still in use as late as 1971. And agency technicians have
continued to make remarkable advances in the "state of the
art." Today spy satellites, capable of producing photographs
from space with less than ( DELETED ) resolution, lead all
other collection means as a source of intelligence. The S&T
Directorate has also been a leader in developing other techni-
cal espionage techniques, such as over-the-horizon radars,
"stationary" satellites, and various other electronic infor-
mation-gathering devices.
The normal procedure has been for the S&T Directorate,
using both CIA and Pentagon funds, to work on a collection
system through the research-and-development stage. Then,
once the system is perfected, it is turned over to the Defense
Department. In the case of a few particularly esoteric systems,
the CIA has kept operational control, but the agency's S&T
budget of about SL20 million per year is simply not large
enough to support many independent technical collection
systems.
CIA technicians, for example, worked with Lockheed Air-
craft at a secret site in Nevada to develop the A- 11, proba-
bly the most potent airborne collection system ever to fly. In
February 1964, before the plane became operational. President
Johnson revealed its existence to the news media, describing
it as a long-range Air Force interceptor. Five months later,
at another news conference, the President disclosed that
there was a second version of the aircraft, which he de-
scribed as "an advanced strategic reconnaissance plane for
military use, capable of world-wide reconnaissance." Three
years after that, when the A-11, now the SR-71, was flying
regularly, the program was turned over to the Air Force.
Just before the actual transfer, . . . The White House gave its
approval for trial flights . . . and three of the sleek black
planes left a secret base . . . and landed in . . . From there,
the planes carried out reconnaissance flights over . . .
68
The CIA and the Cult of Intelligence
Any reasonable reviewer of the CIA, after surveying the
deployment of agency funds and personnel and weighing
these against the intelligence gains produced by the various
directorates, would probably come to the same conclusion as
did Richard Helms' temporary replacement as Director, James
Schlesinger. On April 5, 1973, Schlesinger admitted to the
Senate Armed Forces Committee that "We have a problem
... we just have too many people. It turns out to be too
many people on the operational areas. These are the people
who in the past served overseas. . . . Increasing emphasis is
being placed on science and technology, and on intelligence
judgments. "
Schlesinger's words — and the fact that he was not a "house
man" from the Clandestine Services — were auguries of hope
to those many critics of the CIA who believe that it is overly
preoccupied with the covert side of intelligence. But Schle-
singer lasted only four months at the agency before he was
named Secretary of Defense, and the changes he effected were
generally confined to a 6-percenI staff cut and an early-retire-
ment program for certain superannuated employees. Schle-
singer has been succeeded by William Colby — a man who had
a highly successful career as a clandestine operator specializing
in "dirty tricks." and who can only by expected to maintain
the Dulles-Helms policy of concentration on covert action.
At present the afjency uses about two thirds of its funds and
its manpower for covert operations and their support — pro-
portions that have been held relatively constant for more
than ten years. Thus, out of the agency's career work force
of roughly 16,500 people and yearly budget of about $750
million, 11,000 personnel and roughly $550 million are ear-
marked for the Qandesline Services and those activities of
the Dirccloralc of Management and Services (formerly the
Directorate of Support), such as communications, logistics,
and training, which contribute to covert activities. Only about
20 percent of the CIA's career employees (spending less
than 10 percent of the budget) work on intelligence analysis
and information processing. There is little reason, at present,
to expect that things will change.
The Intelligence Community
Taken as a whole, U.S. intelligence is no longer made up of
a small glamorous fraternity of adventurous blue-bloods —
The CIA and the Inlelligence Community
69
men motivated by a sense of noblesse oblige who carry out
daring undercover missions. That is the romantic myth with-
out which there would be few spy novels, but it is not the
substance of the modern intelligence profession. Today the
vast majority of those in the spy business are faceless, desk-
bound bureaucrats, far removed from the world of the secret
agent. To be sure, the CIA still strives to keep alive such
techniques as classical espionage and covert action, but its
efforts have been dwarfed by the huge technical collection
programs of other government intelligence organizations —
chiefly military agencies.
In all, there are ten different components of the federal
government which concern themselves with the collection
and/or analysis of foreign intelligence. These ten agencies,
complete with their hundreds of subordinate commands,
offices, and staffs, are commonly referred to as the "in-
telligence community." Operating silently in the shadows
of the federal government, carefully obscured from public
view and virtually immune to congressional oversight, the
intelligence community every year spends over S6 billion
and has a full-time work force of more than 150,000
people. The bulk of this money and manpower is devoted
to the collection of information through technical means and
the processing and analysis of that information. The intelli-
gence community amasses data on all the world's countries,
but the primary targets are the communist nations, especially
the Soviet Union and China, and the most sought-after
information concerns their military capabilities and intentions.
Size and Cost of
U.S. Intelligence Community
(Approximate)
ORGANIZATION
PERSONNEL
ANNUAL
BUDGET
Central Intelligence Agency
16,500
$750,000,000
National Security Agency*
24,000 $1,200,000,000
Defense Intelligence Agency*
5,000
$200,000,000
'Depanmeni of Defense agency
70 The CIA and the Cull of Inielligence
Army Intelligence*
Naval Intelligence*
Air Force Intelligence*
(Including the National
Reconnaissance Office)
35.000 $700,000,000
15.000 S600;000.000
56.(X)0 S2.7()0,(X)0,O0O
State Department
(Bureau of Intelligence
and Research) ^ m $8,000,000
Federal Bureau of Investigation
(Internal Security Division) 800 $40,IX)0,000
Atomic Energy Commission 3<K] $20,000,000
(Division of Intelligence)
Treasury Department 3(X) $10,000.000
TOTAL 153.250 $6,228,000,000
As can be seen, the intelligence community's best-known
member, the CIA, accounts for less than 15 percent of its
total funds and personnel. Despite the agency's compara-
tively small size, however, the head of the CIA is not only
the number-one man in his own agency but, as a result of
the National Security Act of 1947, is also the Director of
Central Intelligence (DCI) — the titular chief of the entire
intelligence community. However, the community which the
DCI supposedly oversees is made up of fiercely independent
bureaucratic entities with little desire for outside supervision.
All the members except the CIA are parts of much larger
governmental departments, and they look to their parent
agencies for guidance, not to the DCI. While all participants
share the same profession and general aim of protecting the
national security, the intelligence community has developed
into an interlocking, overlapping maze of organizations, each
with its own goals. In the words of Admiral Rufus Taylor,
former head of Naval Intelligence and former Deputy Direc-
tor of the CIA, it most closely resembles a "tribal federation."
The Director of Central Intelligence heads up several inter-
'Dcparlmcnl of Defense iigency
The CIA and llie Intelligence Community
71
agency groups which were created to aid him in the manage-
ment and operation of the intelligence community. The DCI's
two principal tools for managing intelligence are the Intelli-
gence Resources Advisory Committee (IRAC) and the United
States Intelligence Board (USIB). The IRAC's members
include representatives from the State Department, Defense,
the Office of Management and Budget, and the CIA itself.
(Since the agency's Director chairs the group in his role as
DCI, or head of the intelligence community, the CIA is also
given a seat.) IRAC was formed in November 1971, and it is
supposed to prepare a consolidated budget for the whole
community and generally assure that intelligence resources
are used as efficiently as possible. However, it has not been
in existence long enough for its performance to be judged,
especially since three different DCIshave already headed it.
The USIB's main tasks are the issuance of National Intelli-
gence Estimates and the setting of collection requirements
and priorities. Under it are fifteen permanent inter-agency
committees and a variety of ad hoc groups for special
problems. Working through these committees and groups,
the USIB. among other things, lists the targets for American
intelligence and the priority attached to each one.* coordinates
within the intelligence community the estimates of future
events and enemy strengths, controls the classification and
security systems for most of the U.S. government, directs
research in the various fields of technical intelligence, and
decides what classified information will be passed on to foreign
friends and allies.**
The USIB meets every Thursday morning in a conference
room on the seventh floor of CIA headquarters. At a typical
'Although in a crisis situation, like the Implcmcntatlnn of the Arab-Israeli
cease-fire in I97U. Henry Kissinger or occasionally the Prusidcnl himself may
set the standards. In the I97U case
3Vi LINES DELETED
"Intelligence reports are routinely provided to certain foreign countries,
especially the English-speaking ones, on the basis of so-called intelligence
agreements entered into by the DCI and his foreign equivalents. Although
these agreements commit the United States government to a specified course
of action enforceable under international law. they arc never submitted as
treaties to the U.S. Senate. In fact, they arc negotiated and put into force in
complete secrecy, and no member of the Senate Foreign Relations Committee
72
The CIA and the Cult of Intelligence
meeting there are three or four subjects on the agenda, itself
a classified document which the USIB secretariat circulates
to each member a few days before the meeting. The first
item of business is always the approval of the minutes of the
last session: in the interest of security, the minutes are
purposely made incomplete. Then the USIB turns to the
Watch Report, which has been prepared earlier in the week
by an mter-agency USIB committee responsible for keeping
an eye out for any indication that armed conflict, particu-
larly one which might threaten the United States or any of
its allies, may break out anywhere in the world. A typical
Watch Report might, in effect, say something like: War
between the United States and the Soviet Union does not
seem imminent this week, but the Soviets are going ahead
with the development of their latest missile and have moved
two new divisions into position along the Chinese border;
North Vietnamese inflltration along the Ho Chi Minh trail
(as monitored by sensors and radio intercepts) indicates that
the level of violence will probably rise in the northern half of
South Vietnam; and satellite photos of the Suez Canal
( DELETED ) point to a higher level of tension between
Israel and Egypt.
Once the USIB gives its routine assent, the Watch Report
is forwarded to the nation's top policy-makers, who nor-
mally do not even glance at it, since they know that every-
thing in it of any consequence has already been distributed
to them in other intelligence reports. If some apocalyptic
sign that war might break out were ever picked up by any
agency of the community, the President and his top aides
would be notified immediately, and the USIB would not be
consulted; but as long as nothing of particular note is
occurring, every Thursday morning the USIB spends an
average of about thirty seconds discussing the Watch Report
(which actually takes several man-weeks to prepare) before
it is forwarded to the White House.
Next on the USIB agenda is the consideration and, almost
always, the approval of the one or two National Intelligence
Estimates which have been completed that week. These
estimates of enemy capabilities and future events are drafted
in advance by the CIA's National Intelligence Officers and
then coordinated at the staff level with the various USIB-
member agencies. By the time the estimates comes before
the USIB itself, all differences have normally been compro-
The CIA and the Intelligence Communiry
73
mised in the inter-agency coordination meetings, or. failing
in that accommodation, a dissenting member has already
prepared a footnote stating his agency's disagreement with
the conclusions or text of the NIE.
Once the USIB has approved the estimates before it (now
certified as the best judgments of the intelligence community
on the particular subject), the board turns to any special
items which all the members have the prerogative of placing
on the agenda. One Thursday in 1969 the chief of Naval
Intelligence asked the USIB to reconsider a proposal, which
had earlier been turned down at the USIB subcommittee
level, to furnish the Brazilian navy with relatively advanced
American cryptological equipment. Because of the sensitiv-
ity of U.S. codes and encrypting devices, exports — even to
friendly countries — need the USIB's approval; the board
turned down this particular request. At another meeting in
1970 the special discussion was on whether or not a very
sophisticated satellite should be targeted against the ( DE-
LETED ) part of the (DELETED) instead of (DELETED).
The Air Force's request to (DELETED) its satellite came to
the USIB under its responsibility for setting intelligence-
collection priorities; citing the great cost of the satellite and
the possibility that the (DELETED) might lead to a mal-
function, the USIB said no to the (DELETED). In another
1970 meeting the USIB considered a Pentagon proposal to
lower the U.S. government's research goals for the detection
of underground nuclear explosions. Again the USIB said
no."
On occasion, when extremely sensitive matters are to be
discussed, the USIB goes into executive session — the practi-
cal effect of which is that all staff members leave the room
and no minutes at all are kept. The USIB operated in this
atmosphere of toal privacy for a 1969 discussion of the Green
*Thc Pentagon claimed ihai ihcrc was noi enough money available in its
budget to attain the level of detection on ihc Richtcr scale set forth in the
USIB guidelines, and that relaxing the standard reflected this fmancial reality.
The State Department argued that a changed goal might open the intelligence
community up to criticism on grounds that it had not done everything possible
to achieve a comprehensive nuclear test ban — which would ultimately be
dependent on both sides, being confident that cheating by the other party
could be detected. DCI Helms sided with State But the civilian victory was a
hollow one. since there was no way the DCI could ensure that the Pentagon
would indeed spend more money on seismic research in order to be able to
meel the levpl nf H^li>rtinn fiv«-H hv the- I ICIR
74
The CIA and the Cidi of IntMgence
The U^. lolelligenee Conmunily
Tlx PTOUtW
■ Of
Amic Encro
DtfCH I
Amilut
fur lateL
JniBt dlit/l
SccuritT
Cattnl
olSlma I
[nteOiaiDCv
Mip
CMkaol
lonnUiiljaill
The CIA and the Intelligence Community
75
76
The CIA and the Cull of Intelligence
Beret murder case and again in 1970 for a brieflng of the
Fitzhugh panel's recommendations on the reorganization of
Pentagon intelligence (see p. 89).
Under DCI Helms, most USIB meetings were finished
within forty-five minutes. Since almost all of the substantive
work had been taken care of in preparatory sessions at the
staff level, the USIB rarely did anything more than ratify
already determined decisions, and thus the board, the highest-
level substantive committee of the U.S. intelligence com-
munity, had very little work to do on its own.
The USIB and its fifteen committees deal exclusively with
what is called national intelligence — intelligence needed, in
theory, by the country's policy-makers. But there is a second
kind of intelligence — "departmental" — which is, again in
theory, solely for the use of a particular agency or military
service. The Army, Navy, and Air Force collect great amounts
of departmental intelligence to support their tactical missions.
For example, an American commander in Germany may
desire data on the enemy forces that would oppose his
troops if hostilities broke out, but the day-to-day movements
of Soviet troops along the East German border are of little
interest to high officials back in Washington (unless, of
course, the Soviets are massing for an invasion, in which
case the information would be upgraded to national intel-
ligence). The dividing line between national and departmen-
tal intelligence, however, is often quite faint, and the mili-
tary have frequently branded as departmental a number of
wasteful collection programs that they know would not be
approved on the national level.
Although the CIA has had since its creation exclusive
responsibility for carrying out overseas espionage operations
for the collection of national intelligence, the various mili-
tary intelligence agencies and the intelligence units of Ameri-
can forces stationed abroad have retained the right to seek
out tactical information for their own departmental require-
ments. During the Korean and Vietnamese wars, field com-
manders understandably needed data of enemy troop move-
ments, and one way of obtaining it was through the hiring of
foreign agents. But even in peacetime, with U.S. forces
permanently stationed in countries like England, Germany,
Italy, Morocco, Turkey, Panama, Japan, and Australia, the
military intelligence services have consistently sought to ac-
The CIA and the Intelligence Community T7
quire information through their own secret agents — the
justification, of course, always being the need for departmen-
tal or tactical intelligence. To avoid duplication and prolifera-
tion of agents, all of these espionage missions are supposed
to be coordinated with the CIA. But the military often fail
to do this because they know the CIA would not give its
approval, or because an arrangement has been previously
worked out to the effect that as long as the military stay out
of CIA's areas of interest, they can operate on their own.
Every military unit has an intelligence section, and few com-
manders wish to see their personnel renuiin idle. Therefore,
if for no other reason than to keep their soldiers occupied,
American military intelligence units overseas are usually in-
volved in the espionage game.
For example, a militar\' intelligence unit a.ssigned to Bangkok,
Thailand, as late as 1971 was trying to entrap Soviet KGB
officers, recruit local spies, and even was attempting to run
its own agents into China through Hong Kong. Little or
none of this activity was being cleared with the CIA. Similarly,
in Army intelligence officers stationed in the . . . at virtually
every level, and others operating in Germany were revealed
in 1973 to be carrying out extensive covert surveillance —
including phone taps — of American antiwar and leftist civil-
ians.
The tribalism that plagues the intelligence community is at
its worst in the military intelligence agencies, and most of
the personnel working for these organizations feel their first
loyalty is to their parent service. The men who run military
intelligence are almost all career officers who look to the
Army, Navy, and Air Force for promotion and other
advancement. They serve only a tour or two in intelligence
before they return to conventional military life. Very few are
willing to do anything in their intelligence assignments which
will damage their careers, and they know all too well that
analysis on their part which contradicts the views or the
policies of the leadership of their parent service will not be
well received. Thus, their intelligence judgments tend to be
clouded by the prejudices and budgetary needs of the mili-
tary service whose uniform they wear.
The Army, the Navy, and the Air Force traditionally
maintained their own independent intelligence agencies —
ostensibly to support their tactical responsibilities and to
maintain an enemv "order of battle." Each service collected
78 The CIA and the Cult of Intelligence
its own information and quite often was less than forthcom-
ing to the others. The result was a large amount of duplica-
tion and an extremely parochial approach in each service's
analysis of enemy capabilities.
This self-serving approach of the military services toward
intelligence led to the formation in 1961 of the Defense
Intelligence Agency, which was supposed to coordinate and
consolidate the views and, to some extent, the functions of
the three service agencies. It was planned that the DIA
would replace the Army, Navy, and Air Force at the USIB
meetings, but Allen Dulles and successive DCIs have balked
at leaving total responsibility for representing the Pentagon
to the DIA, which has subsequently developed its own brand
of parochialism as the intelligence arm of the Join Chiefs of
Staff. TTius, while only the DIA is an official USIB member,
the heads of the three service agencies remain at the table
for the weekly sessions, push their pet theories, and demand
that footnotes he included in intelligence estimates that run
contrary to their views of their service.
Aside from operating the overt system of military attaches
working out of American embassies overseas, the DIA does
little information collection on its own. It is largely depen-
dent on the service intelligence agencies for its raw data, and
its 5,000 employees process and analyze this material and
turn it into finished intelligence reports which are circulated
within the Pentagon and to the rest of the intelligence
community. The DIA also prepares daily and weekly intelli-
gence digests that are similar in form and content to the CIA
publications, and makes up its own estimates of enemy
capabilities. This latter function did not take on much signifi-
cance in the DIA until November 1970, when the agency was
reorganized and Major General Daniel Graham was given a
mandate by DIA chief Lieutenant General Donald Bennett
to improve the agency's estimating capability. Graham had
served two earlier tours of duty in CIA's Office of National
Estimates, and he quickly established the DIA office as a
serious rival to the agency's estimative function. *
*As a colonel in the late I96(k, Graham nearly resigned from the Army lo
accept an offer of permanent employment with the CIA. In early 1973 DCI
James Schlesinger brought him back to the agency, still in uniform, to work
on military estimates. Graham was widely known in the corridors of the CiA
as the funny lililc military offlccr who hung a drawing of a bayonet over his
desk with a caption describing it as "The weapon of the future."
The CIA and the Intelligence Community
79
Although the DIA was originally intended to take over
many of their functions, the service intelligence agencies
have continued to grow and flourish since its founding. Indeed,
each of the three is larger than the DIA, and Air Force
intelligence is the biggest spy organization in the whole
intelligence community, with 56,000 employees and an an-
nual budget of about $2.7 billion. Most of this latter figure
goes to pay for the extremely costly reconnaissance satellites
and the rockets necessary to put them in orbit. A separate
part of Air Force intelligence, the Naliunal Reconnaissance
Office, operates these satellite programs for the entire
community, and the NRO's budget alone is more than SI .5
billion a year. The NRO works in such intense secrecy that
its very existence is classified. Its director for many years was
a mysterious Air Force colonel (and later brigadier general)
named Ralph Steakley, who retired in the early 1970s to take
employment with Westinghouse, a defense contractor which
sells considerable equipment to the NRO.
The Office of Naval Intelligence, with about 15,OtO em-
ployees and a S6(X) million annual budget, is perhaps the
fastest-growing member of the intelligence community. At
the same time submarine-missile (Polaris and Poseidon) pro-
grams have in recent years received larger and larger bud-
gets ( DELETED ) have similarly captured the imag-
ination of the military planners. Naval Intelligence operates
( DELETED ) crammed with the most modern sensors,
radars, cameras, and other listening devices which
3 LINES DELETED
The Navy formerly sent surface ships, like the Liberty and
the Pueblo, on similar missions, but since the attack on the
former and the capture of the latter, these missions have
largely been discontinued.
Army Intelligence is the least mechanized of the three
service agencies. Its mission is largely to acquire tactical
intelligence in support of its field forces. Yet, due to the
great size of the Army and the proliferation of G2-type
units, the Army still manages to spend about $700 million
annually and employ 35,000 people in intelligence.
The remaining large component of military intelligence is
the National Security Agency. The NSA, the most secretive
member of the intelligence community, breaks foreign codes
80
Thi" CIA and the Cull o f Intelligence
and ciphers and develops secure communications for the
U.S. government — at a cost to the taxpayer of about $1.2
billion every year. Founded in 1952 by a classified presiden-
tial order, the NSA employs about 24,000 people. Its head-
quarters is at Fort Mcadc, Maryland, and its hundreds of
listening posts around the world eavesdrop on the communi-
cations of most of the world's countries— enemy and friend
alike. Most of the NSA's intercept stations are operated by
special cryptological units from the armed forces, which are
subordinate to the head of the NSA.
Under the Fitzhugh recommendations, which were put into
effect in 1972. the Assistant Secretary of Defense for Intelli-
gence has overall responsibility for military intelligence. In-
dependent of the Joint Chiefs of Staff and the military services,
he is supposed to coordinate and generally supervise the
activities of the DIA, the service intelligence agencies, the
NSA, the Defense Mapping Agency, and the Defense Inves-
tigative Service. These latter two organizations were formed
in early 1972 (also as, a result of the Fitzhugh recommendations)
out of the three separate mapping and investigative agencies
which had previously existed in the Army, Navy, and Air
Force. The mappers, aided by satellite photography, chart
nearly every inch of the earth's surface. The investigators
perform counterintelligence work and look into the back-
grounds of Defense Department personnel. In the late 1960s,
however, the three units which would later become the
Defense Investigative Service devoted much of their time
and effort to reporting on domestic dissident and anti-war
groups. The Secretary of Defense ordered that this military
surveillance of civilians be stopped in early 1971, but there
are indications that it is still going on.
The State Department's Bureau of Intelligence and Re-
search has the smallest budget in the intelligence community —
only $8 million — and it is the only member with no collection
capability of its own. It is completely dependent on State
Department diplomatic cables and the sources of other com-
munity members for the data which its 350 employees turn
into finished intelligence reports. INR represents State on all
the USIB and other inter-agency panels dealing with intel-
ligence. It coordinates within State the departmental posi-
tion for 40 Committee meetings, and does the Under
Secretary's staff work for these meetings. The Director of
The CIA and the Intelligence Community
81
INR until the end of 1973, Ray S. Cline, spent twenty-two
years with the CIA before he joined the State Department
in 1969. He had risen to be the agency's Deputy Director for
Intelligence before losing out in an internal CIA struggle in
1966, when he was sent off to head agency operations in West
Germany. Although the German station was (and is) the
CIA's largest in the world, Cline was far from the center of
power in Washington. However, his absence apparently did
not diminish either his bureaucratic skills or his capabilities
as an intelligence analyst, and he bolstered INR's position
within the community, although the bureau, without any
resources of its own, still remains a comparatively minor
participant.*
The FBI, the Atomic Energy Commission, and the Trea-
sury Department — the lesser members of the USIB — are all
active participants in the intelligence community although the
primary functions of these organizations are unrelated to the
collection of foreign intelligence. Nevertheless, the FBI's
internal-security duties include protecting the country against
foreign espionage attempts, a responsibility considered to be
associated with that of the intelligence community. The Atomic
Energy Commission has an intelligence division which con-
cerns itself with information about nuclear developments in
foreign countries and maintains technical listening posts around
the world (sometimes manned by CIA personnel) to monitor
foreign atomic blasts. The Treasury Department's connec-
tion with the intelligence community is based primarily in its
campaign to halt drugs entering the United States.
Contrary to the National Security Act of 1947, the CIA today
does not in fact perform the function of "coordinating the
intelligence activities of the several governmental depart-
ments and agencies." For a time during the early 1950s the
DCI did manage some degree of control over the other
agencies, but in the years that followed came the technologi-
cal explosion in intelligence and with it the tremendous
expansion of the community. The spying trade was trans-
formed — everywhere but at the CIA — from a fairly small,
agent-oriented profession to a machine-dominated information-
'INR's position within the intelligence community has been upgraded recently
because of Henry Kissinger's assumption of the role of Secretary of State and
by his appointment of long-time NSC aide and former CIA officer William
Hyland to the post of director.
82 The CIA and the Cull of Intelligence
gathenng enterprise of almost boundless proportions. Tech-
nical collection, once a relatively minor activity in which
gentlemen did read other gentlemen's mail, blossomed into
a wide range of activities including COMINT (communications
intelligence). SIGINT (signal intelligence), PHOTINT (photo-
graphic intelligence), ELINT (electronic intelligence), and
RADINT (radar intelligence). Data was obtained by highly
sophisticated equipment on planes, ships, submarines, orbit-
ing and stationary space satellites, radio and electronic inter-
cept stations, and radars — some the size of three football
fields strung together. The sensors, or devices, used for
collection consisted of high-resolution and wide-angle cameras,
infra-red cameras, receivers for intercepting micro-wave trans-
missions and telemetry signals, side-looking and over-the-
horizon radars, and other even more exotic contrivances.
The proliferation of technical collection has also had a
significant influence on the personnel makeup of the intelli-
gence community. TTie mountains of information received
gave rise to a variety of highly specialized data processors;
cryptanalysts. traffic analysts, photographic interpreters, and
telemetry, radar, and signal analysts, who convert the incom-
prehensible bleeps and squawks intercepted by their ma-
chines into forms usable by the substantive intelligence
analysts. And it has created a new class of technocrats and
managers who conceive, develop, and supervise the opera-
tion of systems so secret that only a few thousand (sometimes
only a couple of hundred) people have high enough security
clearances to see the finished intelligence product.
The information collected by the technical systems consti-
tutes the most valuable data available to U.S. intelligence.
Without it, there would be no continuing reliable way for
government to determine with confidence the status of
foreign — especially Soviet and Chinese — strategic military
capabilities. Without it, also, there would have been no
agreement with the Soviet Union in 1972 for the limitations
of strategic armaments, since that pact was absolutely depen-
dent on each side being confident that it could monitor new
military developments — even possible cheating — on the other
side through its own satellites and other surveillance equip-
ment.
The first advanced overhead-reconnaissance systems — the
U-2 spy planes and the early satellites in the late 19S0s and
early 1960s — provided valuable information about the Soviet
The CIA and the Intelligence Community 83
Union, but their successes only whetted the appetites of
U.S. military planners, who had so long been starved for
good intelligence on America's main adversary. Once they
got a taste of the fruits of technical collection, they de-
manded more specific and more frequent reporting on the
status of the Soviet armed forces. And the technicians, with
nearly unlimited funds at their disposal, obliged them, partly
because the technicians themselves had a natural desire to
expand the state of their art.
A complementary circle of military intelligence requirements
and technical collection methods evolved. Collection re-
sponded to requirements and, in turn, generated still further
demands for information, which resulted in the development
of yet bigger and better collection systems. If some particu-
lar type of data could somehow be collected, invariably one
or another part of the Pentagon would certify that it was
needed, and a new technical system for gathering it would
be developed. The prevailing ethic became collection for
collection's sake.
In the infant years of the technological explosion, Allen
Dulles paid scant attention to technical collection's potential
as an intelligence tool. He was far more interested in clandes-
tine operations and the overthrowing of foreign governments.
After the Bay of Pigs debacle in 1961 cut short Dulles' career
as DCI, his successor, John McCone, soon grasped the im-
portance of the new information-gathering systems. He tried
to reassert the CIA's leadership position in this area, and as
part of his effort he created the Directorate for Science and
Technology and recruited a brilliant young scientist, Albert
"Bud" Wheelon, to head the component. But try as he
might, the tenacious, hard-driving McCone could not cope
with the Pentagon juggernaut, then under the direction of
Robert McNamara, who energetically supported the military
services in their efforts to gain maximum control of all
technical collection. McCone was forced to conclude that the
battle with the Defense Department was lost and the trend
toward Pentagon domination was irreversible. This was one
of the reasons that McCone resigned in 1965 (another being,
in McCone's view. President Johnson's lack of appreciation
for strategic intelligence such as the National Intelligence
Estimates).
McCone was followed by Admiral William Raborn, whose
ineffective tour as DCI was mercifully ended after only
84 The CIA and the Cull of Inielligcnce
fourteen months, to the relief of all members of the intelli-
gence community.
Richard Helms took over the CIA in the spring of 1966.
Like Dulles, he was much more interested in the cloak-and-
dagger field, where he had spent his entire career, than in
the machines thai had revolutionized the intelligence trade.
Although he was Director of Central Intelligence, not just
the head of CIA, Helms rarely challenged the Pentagon on
matters regarding technical collection — or, for that matter,
intelligence analysis — until, belatedly, his Inst years as DCI.
As a result, during his directorship the CIA was completely
overshadowed by the other agencies in all intelligence activi-
ties other than covert operations, and even here the military
made deep inroads.
Richard Helms clearly understood the bureaucratic facts
of life. He knew all too well that he did not have Cabinet
status and thus was not the equal of the Secretary of Defense,
the man ultimately responsible for the military intelligence
budget. Helms simply did not have the power to tell the
Pentagon that the overall needs of U.S. intelligence (which
were, of course, his responsibility as DCI) demanded that
the military cut back on <i particular spying program and
spend the money elsewhere. Since managing the intelligence
community did not interest him very much anyway, only on
a few occasions did he make the effort to exercise some
measure of influence over the other agencies outside the
CIA.
In 1967 Helms was urged by his staff to authorize an official
review of intelligence collection by community members,
with special emphasis on the many technical collection systems.
However, Helms was reluctant to venture far into this highly
complex, military-controlled field, and decided only to autho-
rize a study of the CIA's "in-house" needs. He named an
experienced senior agency officer, Hugh Cunningham, to
head the small group picked to make the study. Cunningham,
a former Rhodes scholar, had previously served in top posi-
tions with the Clandestine Services and on the Board of
National Estimates. With his broad exp>erience, he seemed
to agency insiders to be an ideal choice to carry out the
review. After several months of intense investigation, he and
his small group concluded — this was the first sentence of
their report — "The United States intelligence community col-
lects too much information." They found that there was a
The CIA and the Intelligence Community
85
large amount of duplication in the collection effort, with two
or more agencies often spending great amounts of money to
amass essentially the same data, and that much of the infor-
mation collected was useless for anything other than low-
level intelligence analysis. The study noted that the glut of
raw data was clogging the intelligence system and making it
difficult for the analysts to separate out what was really
important and to produce thoughtful material for the policy-
makers. TTie study also obsen ed that the overabundance of
collection resulted in an excess of finished intelligence reports,
many of which were of little use in the formulation of na-
tional policy; there simply were too many reports on too
many subjects for the high-level policy-makers to cope with.
The Cunningham study caused such consternation in the
CIA that Helms refused to disseminate it to the other intelli-
gence agencies. Several of his deputies complained bitterly
about the study's critical view of their own directorates and
the way it seemed to diminish the importance of their work.
Since the study was even harsher in dealing with the military's
intelligence programs, Melms was further unwilling to risk
the Pentagon's wrath by circulating it within the intelligence
community. He decided to keep the controversial report
within the CIA.
Always the master bureaucrat. Helms resorted to the time-
honored technique of forming another special study group to
review the work of the first group. He organized a new
committee, the Senior Executive Group, to consider in gen-
eral terms the CIA's managerial problems. The SEG's first
job was to look over the Cunningham study, but its mem-
bers were hardly fitted to the task. They were the chiefs of
the agency's four directorates, each of which had been heav-
ily criticized in the original study; the Executive Director
(the CIA's number-three man), a plodding, unimaginative
former support officer; and — as chairman — the Deputy DCI,
Admiral Rufus Taylor, a career naval officer. After several
prolonged meetings, the SEG decided, not surprisingly, that
the study on collection was of only marginal value and
therefore not to be acted on in any significant way. A short
time later Cunningham was transferred to the Office of
Training, one of the CIA's administrative Siberias. The SEG
never met again.
Although Richard Helms showed little talent for manage-
ment — and even less interest in it — during his years as DCI
86
The CIA and the Cult of Intelligence
he did make some efforts to restrict the expansion of the
intelligence community. One such try was successful. It oc-
oiired in the late 196()s when Helms refused to give his approval
for further development work on the Air Force's extremely
expensive manned orbiting laboratory (MOL), which was
then being promoted as being, among other things, an
intelligence-collection system Without Helms' endorsement,
the Air Force was unable to convince the White House of
the need for the project, and it was subsequently dropped by
the Johnson administration. (Some Air Force officials viewed
Helms' lack of support us retaliation for the Air Force's
"capture" in I%7 of the SR-71 rcconnaissiince plane, which
the CIA had originally developed and would have preferred
to keep under its control, but this criticism was probably
unfair Helms simply seemed to be going along with the
strong pressure in the Johnson administration to cut costs
because of the Vietnam war. and saw the MOL as a particu-
larly vulnerable — and technically dubious — program in a pe-
riod of tight budgets.)
Helms was always a realist about power within the
government, and he recognized that, except in a rare case
like that of the MOL. he simply did not have the clout to
prevent the introduction of most new technical collection
systems. He also understood that the full force of the Penta-
gon was behind these projects — as redundant or superfluous
as they often were — and that if he concentrated his efforts
on trying to eliminate or even reduce unproductive and
outdated systems, he was making enemies who could under-
cut his own pet clandestine projects overseas. But even the
few efforts he did bring against these obviously wasteful
systems failed (save that against the MOL), demonstrating
vividly that the true power over budgets in the intelligence
community lies with the Pentagon, not the Director of Cen-
tral Intelligence.
In 1967, for example. Helms asked Frederick Eaton, a
prominent and conservative New York lawyer, to conduct a
review of the National Security Agency. For some time the
NSA's cost-effectiveness as a contributor to the national
intelligence effort had been highly suspect within the
community, especially in view of the code-breaking agency's
constantly growing budget, which had then risen over the
billion-dollar mark. Eaton was provided with a staff com-
posed of officials from several intelligence offices, including
The CIA and the Intelligence Community 87
the CIA. the State Department, and the Pentagon, and this
staff accumulated substantial evidence that much of the NSA's
intelligence collection was of little or marginal use to the
various intelligence consumers in the community. But Eaton,
after extensive consultation with Pentagon officials, surprised
his own staff by recommending no reductions and conclud-
ing that all of the NSA's programs were worthwhile. The
staff of intelligence professionals rebelled, and Eaton had to
write the conclusions of the review himself.
The lesson of the Eaton study was clear within the intelli-
gence community. The NSA was widely recognized as the
community member most in need of reform, and the profes-
sionals who had studied the matter recommended substantial
change in its programs. Yet Helms' effort to improve the
supersecret agency's performance through the Eaton study
accomplished nothing, and if the Director of Central Intelli-
gence could not. as the professionals said, "get a handle on"
the NSA, then it was highly unlikely that he could ever
influence the expanding programs of the other Pentagon
intelligence agencies.
In 1968 Helms created another select inter-agency group at
the insistence of his staff: the National Intelligence Re-
sources Board (the forerunner of the Intelligence Resources
Advisory Committee). Intended to bring about economies in
the community by cutting certain marginal programs, the
NIRB had more bureaucratic power than any of its predeces-
sors because it was chaired by the Deputy Director of the CIA
and had as members the directors of the Defense Intelli-
gence Agency and the State Department's Bureau of Intelli-
gence and Research. It immediately decided to take a new
look at the NSA's programs, and it singled out a particular
communications-intercept program, costing millions of dol-
lars a year, as particularly wasteful. The NIRB had found
that nearly all intelligence analysts within the community
who had access to the results of the NSA program believed
the data to be of little or no use. These findings were related
to Paul Nitze, then Deputy Secretary of Defense, with the
recommendation that the program be phased out. (The final
decision on continuing the NSA program, of course, had to
be made in the Pentagon, since the NSA is a military intelli-
gence agency.) Nitze did nothing with the recommendation
for several months. Then, as he was leaving office in January
1969, he sent a letter to Helms thanking the DCI for his
88
The CIA and the Cult of Intelligence
advice but informing him that approval had been given by
Pentagon decision-makers to continue the dubious project.
And despite the NIKB's overwhelming arguments against
the project, Nitze did not even bother to list any reason why
the Pentagon chose not to concur with the decision of the
Director of Central Intelligence.
In the wake of such defeats, Helms gave up on making
attempts at managing the intelligence community. At one
point, months later, he observed to his staff thut while he, as
DCI, was theoretically responsible for 100 percent of the
nation's intelligence activities, he in fact controlled less than
15 percent of the community's assets — and most of the other
8S percent belonged to the Secretary of Defense and the
Joint Chiefs of Staff. Under such circumstances, Helms
concluded, it was unrealistic for any DCI ta think that he could
have a significant influence on U.S. intelligence-resource
decisions or the shaping of the intelligence community.
But when the Nixon administration took over in 1969,
some very [wwerful people, including Defense Secretary
Melvin Laird and the President himself, became concerned
about the seemingly uncontrolled expansion of the Pentagon's
intelligence programs. Laird said in his 1970 Defense budget
statement:
Intelligence is both critical and costly. Yet we have
found intelligence activities, with management overlap-
ping or nonexistent. Deficiencies have provoked criticism
that became known even outside the intelligence com-
munity. These criticisms can be summarized in five prin-
cipal points:
1. Our intelligence product was being evaluated
poorly.'
2. Various intelligence-gathering activities overlapped
and there was no mechanism to eliminate the
overlap.
'Some intelligence was not being evaluated at all. and, as a result, a new
concept, "the linear drawer foot." entered the English language. Trannlatcd
from Pentagonesc. this refers to the amount of paper needed to fill a file
drawer one foot in length. A 1969 House Arms Services Committee rcpon
noted that the Southeast Asia office of the DIA alone had SI7 linear drawer
feet of unanalyzed raw intelligence locked in its vaults.
The CIA and the Intelligence Community 89
3. There was no coordinated long-r.inge program for
resource man.Tgemcnt and programming.
4. Significant gaps in intelligence-gathering went
unnoticed.
5. The intelligence community failed to maintain frank
and unrestricted channels of internal communica-
tion.
That same year President Nixon appointed a "blue-ribbon"
panel chaired by Gilbert W. Fitzhugh, chairman of the board
of the Metropolitan Life Insurance Company, to conduct a
review of the Defense Department's entire operations and
organization. Fitzhugh declared at a July 197U press confer-
ence that his investigation showed that the Pentagon was
"an impossible organization to administer in its present form,
just an amorphous lump " Then turning to military spying,
he stated, "I believe that the Pentagon suffers from too
much intelligence. They can't use what they get because
there is too much collected. It would almost be better that
they didn't have it because it's difficult to find out what's
important." The Fitzhugh panel recommended a series of
economies in Pentagon espionage and also urged that a new
post of Assistant Secretary of Defense for Intelligence be
created. Under this proposal, the various military intelli-
gence agencies, which previously had been scattered all over
the Defense Department's organizational chart, were to be
put under the authority of the new Assistant Secretary, who
in turn would report to Secretary Laird.
By 1971, before the Fitzhugh recommendations were put
into effect, the House Committee on Appropriations had
become aware that military intelligence was in need of a
shake-up. The committee released a little-noticed but blister-
ing report which stated that "the intelligence operations of
the Department of Defense have grown beyond the actual
needs of the Department and are now receiving an inordi-
nate share of the fiscal resources of the Department." The
congressional report continued, "Redundancy is the watch
word of many intelligence operations. . . . Coordination is
less effective than it should be. Far more material is col-
lected than is essential. Material is collected which cannot be
evaluated . . . and is therefore wasted. New intelligence means
have become available . . . without offsetting reductions in
old procedures." With these faults so obvious even to the
90
The CIA and the Cult of Intelligence
highly conservative and military-oriented congressional
committee, strong reform measures would have seemed to
be in order. But little was done by the Congress to bring the
intelligence community under control. Tlie fear on Capitol
Hill of violating the sacred mystique of "national security"
prevented any effective corrective action.
Fmally. in November 1971, after a secret review of the
intelligence community carried out by the Office of Manage-
ment and Budget's James Schlesinger, who would a year later
be named Director of the CIA, the Nixon administration
announced "a number of management steps to improve the
efficiency and effectiveness" of U.S. intelligence. The President
rep)onedly had been grumbling for some time about the poor
information furnished him by the intelligence community. Most
recently he had been disturbed by the community's blunder in
assuring that American prisoners were being held at the Son
Tay camp in North Vietnam, which during a dramatic rescue
mission by U.S commandos in 1970 was found to be empty.
Nixon was also angered by the failure of intelligence to warn
about the ferocity of the North Vietnamese response to the
South Vietnamese invasion of Laos in early 1971. (In both
these instances the faulty intelligence seems to have come from
the Pentagon,* although there are good reasons to believe
that in the Son Tay case the President's political desire to
make a show of support for the prisoners outweighed the
strong possibility that no prisoners would be found there.)
The President, as the nation's primary consumer of intelli-
gence, felt that he had a right to expect better information.
Whether a President takes great personal interest in
intelligence, as Lyndon Johnson did, or, as in Nixon's case,
delegates most of the responsibility to an aide (Henry
Kissinger), the intelligence field remains very much a private
presidential preserve. Congress has almost completely abdi-
cated any control it might exercise. Thus, when President
Nixon chose to revamp the intelligence structure in 1971, he
did not even bother to consult in advance those few Con-
gressmen who supposedly oversee the intelligence community.
The ostensible objective of the 1971 reorganization was to
improve management of the intelligence community by giv-
'Reporter Tad Szulc. formerly of the New York Times, recalls thai after the
Son Tay raid a CIA official approached him lo emphasize ihai the agency had
played no pari in ihe operation and thai the faulty information had originated
with military intelligence.
The CIA and the Intelligence Community 91
ing the DC! "an enhanced leadership role ... in planning,
reviewing, coordinating, and evaluating all intelligence pro-
grams and activities, and in the production of national
intelligence." Under the Nixon plan, the DCI's powers over
the rest of the community for the first time included the
right to review the budgets of the other members — an un-
precedented step in the tribal federation of intelligence and
one absolutely necessary to the exercise of any meaningful
degree of control.
But with this very same plan to enhance the DCI's
"leadership role," the President was also placing control
over all U.S. intelligence squarely in the National Security
Council staff, still headed today by Henry Kissinger, even
after he also has become Secretary of State. Kissinger was
put in charge of a new NSC Intelligence Committee which
included as members the DCI, the Attorney General, the
Under Secretary of State, the Deputy Secretary of Defense,
and the Chairman of the Joint Chiefs of Staff. This Intelli-
gence Committee was to "give direction and guidance on
national intelligence needs and provide for a continuing evalua-
tion of intelligence products from the viewpoint of the intelli-
gence user." At the same time the President established
another new body, called the Net Assessment Group, under
Kissinger's control, to analyze U.S. military capabilities in
comparison with those of the Soviets and Chinese as esti-
mated by intelligence studies. Already chainnan of the 40
Committee, which passes on all high-risk CIA covert opera-
tions, and the Verification Panel, which is responsible for
monitoring the intelligence related to the S.A.L.T. negotia-
tions and agreements, Kissinger, with his control now as-
serted over virtually all the NSC's key committees, had
clearly emerged as the most powerful man in U.S. intel-
ligence — as well as in American foreign policy.
Yet with Kissinger almost totally occupied with other
matters, the President clearly intended under his November
1971 reorganization that CIA Director Helms take over and
improve the actual management of the intelligence com-
munity — under Kissinger's general supervision, to be sure.
Partly because of the nearly impervious tribalism of the
community and partly because of Helms' pronounced lack of
interest in management and technical matters, the shake-up
had little effect on the well-trenched ways of the community.
Much to the amazement of his staff, Helms did virtually
92 The CIA and the Cull of Intelligence
nothing to carry out the wishes of the President as contained
in the restructuring order.
Shortly after the 1972 election, Helms was fired by the
President as Director of Central Intelligence. According to
his own testimony before the Senate Foreign Relations
Committee, he wanted to stay on the job, but that was not
the wish of the White House. The President's dissatisfaction
with Helms' management of the intelligence community was
certainly a factor in his ouster, as perhaps were Helms'
social connections with liberal Congressmen and journalists
(some of whom were on the White House "enemies" list).
From his earlier work at the Office of Management and
Budget and the Rand Corporation, James Schlesinger apixared
knowledgeable about the problems facing the community and
moved quickly, once he arrived at the CIA to replace Helms,
to set up the bureaucratic structures necessary to exercise con-
trol over the other intelligence agencies. Me created a new
Deputy Director for Community Relations and strengthened
the Intelligence Resources Advisory Committee, but his four-
month tenure was too short to bring about any large-scale re-
form. And nothing in the record of his successor, William
Colby — a clandestine operator for thirty years — indicates that he
has either the management skills or the inclination to bring the
spiraling growth of the intelligence community under control.
Clearly, the CIA is not the hub, nor is its Director the
head, of the vast U.S. intelligence community. The some-
times glamorous, incorrigibly clandestine agency is merely a
part of a much larger interdepartmental federation domi-
nated by the Pentagon. And although the Director of Cen-
tral Intelligence is nominally designated by each President in
turn as the government's chief intelligence advisor, he is in
fact overshadowed in the realities of Washington's politics
by both the Secretary of Defense and the President's own
Assistant for National Security Affairs, as well as by several
lesser figures, such as the Chairman of the Joint Chiefs of
Staff. Nevertheless, agency directors and the CIA itself have
managed to survive, and at times even flourished, in the
secret bureaucratic jungle because of their one highly special-
ized contribution to the national intelligence effort. The
CIA's primary task is not to coordinate the efforts of U.S.
intelligence or even to produce finished national intelligence
for the policy-makers. Its job is, for better or worse, to
conduct the government's covert foreign policy.
PART II
4.
SPECIAL OPERATIONS
You have to make up your mind (hat you are
going to have an intclhgence agency and protect it
as such, and shut your eyes some and lake what is
coming.
— SLNAT«R )OHN STI NNIS
Chairman. Joint Senate Coniniiltcc
for CIA Oversight
November 23. 1971
Covert action — intervention in the internal affairs of other
nations — is the most controversial of the CIA's clandestine
functions. It is the invariable means to the most variable
ends. It is basic to the clandestine mentality. And the crudest,
most direct form of covert action is called "special operations."
These activities, mostlyof a paramilitary or warlike nature,
have little of the sophistication and subtlety of political ac-
tion (penetration and manipulation) or propaganda and
disinformation. Although planned by the CIA's professionals,
these operations are to a large extent carried out by agency
contract employees and mercenaries — both American and
foreign. Within the CIA's Clandestine Services, "special ops"
have always been viewed with mixed emotions. Most of the
professionals, especially in recent years, have looked down
on such activities, even while at times recommending their
use. It is widely recognized within the agency, however, that
less direct forms of covert action have their limitations,
especially when timely, conclusive action is thought neces-
sary to put down a troublesome rebel movement or to over-
throw an unfriendly government. In these cases, the CIA
usually calls on its own "armed forces," the Special Opera-
tions Division (SOD), to do the job.
By definition, special ops are violent and brutal; most
clandestine operators prefer more refined techniques. The
CIA professional is a flimflam artist, involved in the creative
challenge of plotting and orchestrating a clandestine cam-
96
The CIA and the Cult of Intelligence
paign without resorting to violence. In such nonparamilitary
covert action, the operator tends to keep his hands unbloodied,
and his crimes arc of the white-collar variety — conspiracy,
bribery, corruption. His failure or e.xpiisure is normally pun-
ished only with expulsion from the country where he is
operating. He is. in the end, merely engaging in a "gentle-
man's" game The paramilitary operator, on the contrary, is
a gangster who deals in force, in terror, in violence. Failure
can mean death — if not to the operator himself, then to the
agents he has recruited. TTie SOD man wages war, albeit on
a small and secret level, but none of the rules of warfare
apply. His is a breed apart; in the CIA, special ops types are
sometimes referred to as the "animals" of the agency.
In the CIA's early years, and especially during the Korean
war, many paramilitary (PM) specialists, mostly former mili-
tary men, were hired as career ofHcers. Bui the CIA soon
learned that their military skills were not easily transferable
to other types of clandestine work and that most of the PM
experts were next to useless in the bureaucratic and diplo-
matic setting.s in which the agency usually functions. At
times, when special operations were at a low ebb, the agency
had difficulty in finding jobs that the PM specialists could
handle. Hence, during the late 1950s PM manpower was
gradually reduced to a cadre of a couple of hundred opera-
tors capable of doing the planning and the training for
paramilitary operations. When more men were needed, the
agency would hire them on shorl-lerm contracts. Tliese con-
tract forces tended to be a melange of ex-military men,
adventurers, and outright mercenaries; others came to the
CIA on direct loan from the armed services. The U.S.
Army's Special Forces and the counter-guerrilla units of the
Navy (SEALs) and Air Force (SOFs) provided many of the
recuits, since veterans of these branches already possessed
the most up-to-date paramilitary skills. Sometimes these mili-
tary men "resigned" from the service in order to accommo-
date the CIA's cover requirements of their activities, but
they did so with the understanding that eventually they
would return to military service — their time with the CIA
counting toward promotion and retirement. (This process is
known in the intelligence trade as "sheep-dipping.") But the
agency was always careful to keep direct control over the
planning, logistics, and communications of its special or
Special Operations
97
paramilitary operations. The contractees merely did the dirty
work.
The CIA set up training facilities in the United States and
overseas to prepare both its own career operators and the
temporary personnel on contract for paramilitary work. Camp
Peary — "The Farin" — in Koutiieastern Virginia provided the
basic cour»e!i. More advanced techniques, such as demoli-
tions and heavy weapons, were taught at a secret CIA base
in North Carolina. Instruction in parachuting and air opera-
tions was provided at both these facilities and at the head-
quarters of Intermountain Aviation near Tucson. Arizona.
A secret installation in the Canal Zone was the site for
jungle-warfare and survival training. Here the agency's trainees
would play paramilitary war games, pitted against the
6lite of the U.S. Army's Special Forces.
Large-scale paramilitary operations also necessitated spe-
cial training bases for the mercenaries. For the 1954 Guatema-
lan invasion, the CIA built installations in Nicaragua and
Honduras. For the 1961 attack at the Bay of Pigs, sites were
established again in Nicaragua and this time also in Guatemala,
which had become available to the CIA as a result of its
success there seven years earlier. For its Tibetan operations,
the Agency constructed extensive support facilities in North-
east India and brought large numbers of guerrillas to a de-
serted Army base in Colorado for special training. And for its
many Southeast Asia adventures, the Special Operations
Division had "a home away from home" under Navy cover on
the Pacific island of Saipan.
Saipan, however, was not a U..S. possession, but rather a
Trust Territory of the United Nations under U.S. care, and
consequently there was some concern within the agency that
the establishment and operation of a secret military base
there would raise sticky problems in the U.N. But being
masters of the art of cover and deception, the CIA contin-
gent on Saipan merely "sanitized" the base whenever U.N.
representatives visited the island on inspection tours. Accord-
ing to a native of the island, trainees and instructors alike
disappeared; the barbed wire and "no admittance to unautho-
rized personnel" signs were taken down, in a day or so, the
camp was made to appear just like any other jumble of
military quonset huts, which the inspectors ignored. As soon
as they were gone, however, all was returned to normal, and
the CIA's special ops training was begun anew.
One former officer of the CIA's Clandestine Services,
98
The CIA and the Cult of Intelligence
who was trained in special ops, wrote this account of his
experiences for Ramparts magazine:
The stated purpose of paramilitary school was to train
and equip us to become instructors for village peasants
who wanted to defend themselves against guerrillas. I
could believe in that.
Some of the training was conventional: But then we
moved up to the CIA's demolition training headquarters.
It was here that Cubans had been, and still were [in the
mid-1960s| being trained in conventional and underwater
demolitions. And it was here that we received training
in tactics which hardly conformed to the Geneva
Convention.
The array of outlawed weaponry with which we were
familiarized included bullets that explode on impact,
silencer-equipped machineguns, homemade explosives
and self-made napalm for stickier and hotter Molotov
cocktails. We were taught demolition techniques, prac-
ticing on late model cars, railroad trucks, and gas stor-
age tanks. And we were shown a quick method of
saturating a confined area with flour or fertilizer, caus-
ing an explosion like in a dustbin or granary.
And there was a diabolical invention that might be
called a mini-cannon. It was constructed of a concave
piece of steel fitted into the top of a # 10 can filled with
a plastic explosive. When the device was detonated, the
tremendous heat of friction of the steel turning inside
out made the steel piece a white-hot projectile. There
was a number of uses for the mini-cannon, one of which
was demonstrated to us using an old army school bus. It
was fastened to the gasoline tank in such a fashion that
the incendiary projectile would rupture the tank and
fling flaming gasoline the length of the bus interior,
incinerating anyone inside. It was my lot to show the
rest of the class how easily it could be done. It worked,
my God, how it worked. I stood there watching the
flames consume the bus. It was, I guess, the moment of
truth. What did a busload of burning people have to do
with freedom? What right did I have, in the name of
democracy and the CIA, to decide that random victims
should die? The intellectual game was over. I had to
leave.
Special Operations
99
The heavy reliance on paramilitary methods in the CIA's
special operations is a direct outgrowth of the clandestine
guerrilla programs undertaken by the Office of Strategic
Services during World War II. The OSS. like its British
counterpart. Special Operations Executive, made extensive
use of indigenous underground resistance movements to sab-
otage the activities of German and Japanese armed forces in
the occupied countries and to foment national unrest in
these areas. In running such operations, the OSS officers
performed as advisors and acted as channels for communica-
tions and support from the Albed powers. Basic to the
success of the OSS operations was the fact that the countries
in which it conducted its covert activities were under the
military control of foreign armies despised by native resis-
tance forces. Even so, the resistance movements in most
occupied countries enjoyed limited success until the regular
Allied forces had won sufficient victories to force the Axis
powers into an essentially defensive strategy of protecting
their homelands.
During the early postwar years, as we have noted, the
CIA's initial reaction to the Cold War was to employ the
wartime tactics of the OSS in new efforts to organize and
promote paramilitary resistance movements in such areas as
Albania, the Ukraine, and other parts of Eastern Europe.
Almost all of these operations were complete failures. (Similar
setbacks occurred in agency paramilitary operations against
China and North Korea.) The controlling military forces in
Eastern Europe, although supported by the Soviet Union,
were for the most part of native origin — often directed by
the same political elements that had cooperated with the
OSS and other Allied intelligence services in the prior strug-
gle against the Nazi occupiers. Despite a large amount of
disenchantment with the communist regimes on the part of
the indigenous populations, which the CIA grossly misinter-
preted as revolutionary fervor, the war-weary populations
were not willing to join, in significant numbers, resistance
groups with little chance of success. And under the prevail-
ing political circumstances of the times, there was little likeli-
hood of eventual overt military support from the U.S. armed
forces. Thus, the Eastern European governments, with their
rigid internal-security systems, were easily able to thwart
CIA paramilitary efforts against them.
In those areas of the world not under communist domina-
100
The CIA and the Cult of Intelligence
lion, however, the CIA's clandestine paramilitary opera-
tions fared somewhat better, at least during the early 19SOs.
But unlike the OSS, which had supported partisan groups
fighting against fascist-dominated governments, the CIA more
often than not found itself in the position of supporting the
counterinsurgency efforts of established regimes threatened
from the left by local guerrilla movements. Blinded by its fear
and distrust of communism, the CIA had gradually drifted into
a posture whereby its paramilitary operations were in support
of the status quo. The agency, in pursuit of "stability" and
"orderly change." increasingly associated itself with protect-
ing vested interests. In the view of much of the world, it had
become a symbol of repression rather than freedom. While the
CIA's paramilitary activities were at times successful, many
of the victories won took on a Pyrrhic quality. They always
seemed to work against legitimate social and political change —
for which the U.S. government would in later years be held
accountable by the peoples of these countries.
During the first years of its existence and particularly after
the outbreak of the Korean war in 1950, the CIA recruited
and trained large numbers of officers for special operations.
Many were, of course, intended for service in Korea, but the
Amencan commander there. General Douglas Mac Arthur,
was not particularly fond of clandestine paramilitary opera-
tions, and he did his best to keep the CIA's special-ops
experts out of his theater. The agency did nevertheless man-
age to launch a large number of secret operations, resulting
in the loss of numerous Korean agents and few, if any,
meaningful gains.
With its newly expanded staff, the CIA's Special Opera-
tions Division was able to turn its attention to other coun-
tries In Asia Attempts were made to develop resistance
movements in China, but these efforts accomplished virtu-
ally nothing more than the capture of agency officers John
Downey and Richard Fecteau — and death for the National-
ist Chinese agents they were helping to infiltrate. Mainland
China, like Eastern Europe, was not fertile territory for
agency operations.
There were some successes elsewhere. The Huk insurgency
in the Philippines was put down with CIA help. Agency-
supported Nationalist China troops in Burma (when not
engaging in their principal pastime of trafficking in opium) were
Special Operations
101
induced to conduct occasional raids into the hinterland of
Communist China. In South Vietnam the CIA played ii large
part in consolidating the power of the Diem regime — and this
was considered by the agency to be a major accomplishment.
Such gains in Southeast Asia were offset by some rather
notable failures, most particularly the agency's inability to
overthrow President Sakamo of Indonesia in 19S8. While
this ClA-supporlcd revoH wan going on, the U.S. govern-
ment categorically domed providing any support to the anti-
Sukarno forces. In March 1958. Secretary of State John Foster
Dulles told a congressional committee that "wc are not inter-
vening in the internal affairs of this country." Six weeks later
President Eisenhower stated that while "soldiers of fortune"
probably were involved in the affair, "our policy is one of care-
ful neutrality and proper deportment all the way through so as
not to be taking sides where it is not of our business." These
statements were of course false The Indonesian government
put little credence in the denials and denounced the United
States for its intervention The New York Times, however,
chose to believe the official American version and indignantly
scolded the Indonesians for circulating false reports saying that
the U.S. government was giving aid to the rebels. The Times
commented that the Secretary of State and "the President
himseir' had denied American involvement, and that "the
United States is not ready ... to step in to help overthrow
a constituted government." The pattern of lying to cover up
failure was established; it would find further manifestation
during the U-2 affair, and again at the Bay of Pigs.
In 1959 the CIA found another opportunity to engage in
special ops when the Tibetans revolted against the Chinese
communists who eight years before had imposed their rule
on the mountain kingdom. Sparked by Peking's move to
replace the Dalai Lama. Tibet's traditional religious and tem-
poral ruler, with the Panchen Lama, an important religious
leader controlled by the Chinese, there was a short-lived
uprising. After its failure, the Dalai Lama with several thousand
followers and troops escaped to India, where he and his
loyalists were granted sanctuary. Then,
2V] LINES DELETED
takpi on a tour of friendly Asian and European capitals as
living, though somewhat incongruous proof — since he was
102
The CIA and the Cull of Intelligence
hiimeir an autocrat — or Communist China's totalitarianism.
Later, he uas brought to the United States for a visit, during
which he appeared at the United Nations to plead his case
and to denounce the Peking government.
2 LINES DELETED
special ops ofTicer; began secretly training and reequipping
the Dalai Lama's Iroopfi— rearsome Khamba horsemen— in
preparation for eventual clandestine Torays into Tibet. Some
or the Tibetans were quietly brought to the United States for
special paramilitary training at Camp Hale, Colorado.
Although the CIA ofHcers led their Tibetan trainees to
believe that they were being readied for the reconquering of
their homeland, even within the agency few saw any real
chance that this could happen. Some of the covert operators
who worked directly with the Tibetans, however, eventually
came to believe their own persuasive propaganda. Years
later, they would Hush with anger and frustration describing
how they and their Tibetans had been undone by the bureau-
crats back in Washington.* Several of them would turn for
solace to the Tibetan prayers which they had learned during
their years with the Dalai Lama.
From the beginning of the Tibetan operation, it was dear
that its only value would be one of harassment. Spot raids
■gainst Chinese facilities in the backward mountain country
were an annoyance to Peking and a reminder of its vulnera-
bility. But the dream of reoccupying the land and reestablish-
ing the Dalai Lama as its political ruler was an impossible
one.
The guerrilla raids of the Dalai Lama's forces into Tibet,
planned by CIA operators and on occasion led by agency
contract mercenaries, were supported and covered by
"private" planes of the Civil Air Transport complex, a CIA
proprietary which was also instrumental in secretly supplying
weapons ( DELETED ) part, the raids ac-
complished little beyond giving the Tibetan troops some
temporary satisfaction and fanning their hopes that someday
'This phenomenon of "cmolional attachment" is not rare in the clandestine
business, but it is particularly prevalent in special operations. The officers
who engage in special ops often have a deep psychological need to belong and
believe This, coupled with the dangers and hardships Ihcy »Hllingly endure,
tends 10 drive them to support extreme causes and seek unattainable goals.
Special Operations
103
they would lead a true invasion of their homeland. Commu-
nication lines were cut, some sabota|;e was carried out, and
from lime to lime an ambush of a small Chinese communist
force was undertaken.
One such ambush resulted in an intelligence windfall. The
Tibetans had waylaid a small military convoy on a lonely
mountain road and were preparing to put the torch to the
Chinese vehicles when it was discovered that one of them
contained several mailbags. A quick examination disclosed
that in addition to the routine mix of general correspondence,
the mail included ofTicial government and military docu-
ments being delivered from China proper. The mailbags
were salvaged and returned to India by the Tibetan guerrillas,
where they were turned over to the CIA operatives working
on the operation. The contents of the mailbags were later
analyzed in detail by the agency's China experts in Langley,
Virginia. Data and insights as to the status of the Chinese
occupation of Tibet were found in abundance: while difficul-
ties were being encountered in imposing communist rule on
the feudal system of the mountain nation, it was clear that
the Chinese were in full control of the situation and were
determined to have their way. Even more interesting to the
agency's China watchers, however, was authentic background
Information revealing that Mao Tse-tung's "Great Leap
Forward" had failed in several crucial respects to achieve its
goal of raising China from the depths of underdevelopment.
As incredible as it may seem in retrospect, some of the
CIA's economic analysts (and many other officials in
Washington) were in the early 1960s still inclined to accept
much of Peking's propaganda as to the success of Mao's
economic experiment. The acquisition of the Tibetan docu-
ments was a significant contribution to the resolution of this
particular debate within the U.S. intelligence community.
Without any other noteworthy gains, the Tibetan opera-
tion sputtered hopelessly on. A few years later, at the end of
1964, the Chinese removed the Panchen Lama from power,
setting off another minor revolt. But the Dalai Lama's CIA-
trained troops, now more than five years in exile in India,
were unable to come to the rescue of their countrymen.
With the CIA's Bay of Pigs defeat still fresh in American
minds, there was little interest in Washington in supporting
the dreams of the Khamba horsemen. Gradually the Tibetan
operation atrophied. By the late 1960s the CIA's clandestine
104
The CIA and the Cult of Inielligence
operatives were interested only in seeking a graceful way
to terminate their association with the Dalai Lama and his
aging, now useless troops.
The Tibetan operation was soon overshadowed and suc-
ceeded by CIA involvement in the Congo. The chaotic strife
which gripped that country almost from the moment it be-
came independent of Belgian rule provided the CIA, along
with intelligence services of many other countries, with fer-
tile ground for special opcr.itions. The U.S. government's
intent was to promote a stable pro-Western regime that
would protect foreign investments, and the CIA was given
much of the responsibility for carrying out this policy. At
Ant tbe agencv's covert activiiks were confined to political
■unipHlatioo and cash payments to selected politicians, but
as tbie CoagotcM political scene became more and more
unraveled, the agfiitcy seal its paramilitary experts and mer-
coiarics to support the new government. By 1964, CIA B-26
aircraft fiowa by Cuban pilots under contract with the CIA
were carrying out regular bombing missions agaiml rebel
areas. Later, in 1966, the New York Times would describe the
CIA planes as "an instant air force." While the agency was
not completely happy with this publicity, many operators
were pleased with the newspaper's recognition of the CIA's
skill in putting the operation together on comparatively short
notice.
Relying in large part on the considerable assistance fur-
nished by the CIA and other U.S. government agencies, the
central Congolese government under President Mobutu was
finally able to impose some degree of stability throughout
the country.
3 LINES DELETED
During the years when the Tibetan and Congolese pro-
grams were in full operation, the CIA and its Special Opera-
tions Division were already becoming increasingly preoccupied
with Southeast Asia. In Laos, agency operators were organiz-
ing a private army (L'Arm6e Clandestine) of more than
30,000 men and building an impressive string of bases through-
out the country. A few of these bases were used as jumping-
oir points to send guerrilla raiding parlies into North Viet-
nam and China.
Special Operations
105
The secret war in Laos was viewed within the CIA with
much more favor than the huge military struggle that eventu-
ally developed in Vietnam. The fighting was not highly visi-
ble to the American public or the world. In fact, the Laotian
war was years along before the U.S. Congress even became
aware it was going on. In Laos the CIA was in complete
control, but at no time were more than forty of fifty opera-
tions officers required to direct the paramilitary effort. The
dirty and dangerous work — the ground fighting — was han-
dled by hundreds of agency contract personnel and more
than 30,000 Lao tribesmen under the leadership of General
Vang Pao — whom the CIA from time to time secretly decor-
ated with "intelligence" medals. The CIA's Laotian forces
were augmented by thousands of Thai "volunteers" paid by
the agency. Air support, an extremely dangerous business in
Laos, was supplied by Air America — a CIA-owned airline —
and on occasion by the Thai Air Force. Thus, while the
CIA's special-ops officers masterminded the war and called
all the shots, largely from the Laotian capital of Vientiane or
from secure bases upcountry, most were not required to run
the physical risks of war. The Laotian operation was, as
special operations go. a near-perfect situation for the career
officer.
Meanwhile, in Vietnam the CIA supported and financed a
force of roughly 45,000 Civilian Irregular Defense Guards
(CIDGs). local guerrilla troops who fought under the opera-
tional direction of the U.S. Army's Special Forces. SOD
operators and agency contractees ran the Counter Terror
teams which employed similar methods to oppose the
Vietcong's terror tactics of kidnapping, torture, and murder.
The agency also organized guerrilla raids against North
Vietnam, with special emphasis on intrusions by sea-borne
commando groups coming "over the beach" on specially
designed, heavily armed high-speed PT-type boats. At least
one such CIA raiding party was operating in that part of the
Tonkin Gulf in 1964 where two U.S. destroyers allegedly
came under attack by North Vietnamese ships. These CIA
raids may well have specifically provoked the North Viet-
namese action against the destroyers, which in turn led to
the passage of the Tonkin Gulf resolution by the U.S. Con-
gress in 1964, thus setting the stage for large-scale American
military involvement in Indochina.
The CIA's special operations in Southeast Asia were mas-
106
The CIA and the Cult of Inielligence
sive in scale and an important part of the overall U.S. war
effort. Many of these operations are described in detail in
the U.S. government documents published in The Pentagon
Papers. Neverthcle;^, a few operations not mentioned therein
deserve particular note.
One involved the Nungs. a national minority of Chinese
hill people who fought on the French side in the first Viet-
nam war and then came south in large numbers after 1954.
The Nungs were known to be extremely fierce fighters, and
they became a favorite source of manpower for CIA opera-
tions in South Vietnam. In fact, casual observers could nearly
always spot secret CIA installations in the Vietnamese prov-
inces by the Nung guards out front, dressed invariably in
jungle camouflage uniforms.
In addition, Nung mercenaries were often sent by the CIA
on foray; along the Mo Chi Minh trail. Their function was to
observe North Vietnamese and Vietcong supply movements
and on occasion to make attacks against convoys, or to carry
out sabotage on storage depots. Since nasi of the Nnofs
were illilcrale aa4 had great diffkuhy in seiKling back quick,
accurate reports of what they saw, Ibc CIA technicians devel-
oped a special kind of radio Iransmiller for their unc. Each
Iransmiller had a set of buttons corresponding to pictures of
a lank, a truck, an artillery piece, or some other military-
related object. When the Nung trail watcher saw a Vietcong
conToy, he would push the appropriate button as many
times as he counted such objects go by him. Each push sent
a specially coded ioipuise back to a base camp which could
in this way keep a running account of supply movements on
the trail. In some instances the signals would be recorded by
observation planes that would relay the information to at-
tack aircraft for immediate bombing raids on the trail.
The Nung units made special demands on their CIA case
officers, and consequently they cost the agency about 100
times as much per soldier as the Meos fighting in the CIA's
L'Armee Clandestine in Laos, who could be put into the
field for less than ten cents per man per day. The higher cost
for the Nungs' services was caused by their unwillingness to
go into remote regions under agency command unless they
were regularly supplied with beer and prostitutes — thus the
agency had no choice but to provide flying bar and brothel
services. Even though one of the CIA's own airlines, Air
America, handled this unusual cargo, the cost of the air
Special Operations
107
support was still high. Tlie CIA's ca&e officers would have
preferred to give the Nungs whiskey, which, while more
expensive to buy, was considerably lighter and hence cheaper
to fly in, but the Nungs would fight only for beer. The
prostitutes also presented a special problem because the
agency did not want to compromise the secrecy of the opera-
tions by supplying women from local areas who might be
able to talk to the Nungs. Thus, Air America brought in
only prostitutes from distant parts of Southeast Asia who
had no language in common with the Nungs.
With their characteristic enthusiasm for gimmicks and
gadgetry, the CIA came up with two technical discoveries in
the mid-1960s that were used in Vietnam with limited success
but great delight. The first was a chemical substance origi-
nally developed for oil drilling thai when mixed with mud
increased the mud's slipperiness. The agency hoped to be
able to drop the chemical on the Ho Chi Minh trail during
the rainy season in order to cause mud slides and block the
supply route. In actual practice, however, whatever damage
was caused by the chemical was quickly repaired by the
Vietcong and North Vietnamese.
The agency's other discovery was a weapons-detection
system. It worked by spraying a special chemical on the
hands of a suspected Vietcong and then, after a few minutes,
shining an ultraviolet light on his hands. If the chemical
glowed in a certain manner, that meant that the suspect had
held a metal object — in theory, a weapon — during the pre-
ceding twenty-four hours. The system's main drawback was
that it was just as sensitive to steel farm implements as to
guns and it could implicate a person who had been merely
working with a hammer. The CIA considered the system
such a success, however, that it passed it on through a
domestic training program to the police forces of several
American cities.
17 LINES DELETED
Latin America in 1954 was the scene of one of the CIA's
greatest paramilitary triumphs — the successful invasion of
Guatemala by an agency-organized rebel force. And it was
in Latin America that the CIA seven years later suffered its
most notable failure — the abortive invasion of Cuba at the
Bay of Pigs. But the agency was slow to accept defeat in the
108
The CIA and the Cull of Intelligence
Cuban operation. The only reason for the failure, the CIA's
operators believed, was that President Kennedy had lost his
nerve at the last minute, refusing more air support for the
invasion and withholding or reducing other possible assis-
tance by U.S. forces. Consequently, the agency continued its
relationships with its "penetrations" of Cuban exile groups — in
a way reminiscent of its lingering ties with Eastern European
^migr^ organizations from the early Cold War period. And
the CIA kept many of the Bay of Pigs veterans under contract,
paying them regular salaries for more than a decade afterward.
The failure at the Bay of Pigs did not prevent the CIA
from conducting guerrilla activities against Cuba. The
agency's operational hoses in the United States were still
intact, and these bases were used to launch numerous raids
against Cuba. The agency smuggled men, arms, equipment,
and money onto the island by sea and air, but Castro's
forces almost always either captured or killed the invaders
and their contacts inside Cuba. Time after time, the Cuban
government would parade CIA-sponsored rebels before tele-
vision cameras to display them and their equipment to the
Cuban public and the world. Often the captives made full
confessions of the agency's role in their activities.
Nevertheless, the CIA kept looking for new and better
ways to attack the Castro government. Under contract to the
a|;cncy, the Electric Boat Division of General Dynamics at
Groton, Connecticut, developed a highly mancuverable high-
speed boat designed for use by guerrilla raiders. The boat
was supposed to be Faster than any ship in the Cuban navy,
and thereby able to move arms and men into Cuba at will.
There were numerous delays in putting the boat into
production, however, and no deliveries were made up to
1967. By that time, the U.S. was too deeply involved in
Southeast Asia to think seriously about a new invasion of
Cuba. The CIA, therefore, quietly dropped the boat project
and turned the development model over to the U.S. Navy.
Also during the mid-1960s,
9V2 LINES DELETED
By 1968, almost everyone in the Clandestine Services had
finally accepted the fact that special operations against Cuba
had outlived their usefulness. To be sure, there were still
some diehard veterans around who would continue to pro-
Special Operations
109
pose new schemes, but even "Frank Bender" — the heavy-
accented, cigar-smoking German refugee who had helped
manage the Bay of Pigs fiasco — could no longer bring him-
self to believe in them. The death knell for CIA Cuban
operations was sounded that year, seven years after the Bay
of Pigs, when the agency closed down its two largest bases in
Florida. One of these, located on an old naval air station at
Opalocka, had served as an all-purpose base for CIA-
sponsored raids on Cuba.
3 LINES DELETED
While the CIA was largely concerned with Cuba in its
Latin American operations during much of the I96()s, the rest
of the continent was by no means neglected. For the most
part, the agency's aim was not to overthrow particular Latin
American governments but rather to protect them from local
insurgent movements. The CIA generally avoided getting
involved in any large way, instead using relatively small
amounts of covert money, arms, and advisors to fight leftish
groups. While this switch in tactics reflected the counterinsur-
gency theories popular in the Kennedy and Johnson adminis-
trations, it also came as a result of the diversion of a substantial
part of the nation's military resources — covert and otherwise —
to Southeast Asia.
The CIA assumed the role of coordinator of all U.S.
government counterinsurgency activities in Latin America,
and other agencies — particularly AID, with its police-training
programs, and the Defense Department, with its military-
assistance and civic-action programs — provided the CIA with
cover and additional resources. Much of the agency's man-
power for Latin American special operations was furnished
by the U.S. Army's Special Forces; small detachments of
Green Berets were regularly placed under CIA control. These
soldiers usually came from the Third Battalion of the Sev-
enth Special Forces, located at Fort Gulick in the Canal
Zone. This agency had its own paramilitary base in the
Canal Zone, and even when the Special Forces carried on
missions outside the CIA's direct command, agency opera-
tors kept in close touch with what was going on. Since 1962
more than 600 Special Forces "mobile training teams" have
been dispatched to the rest of Latin America from Fort
1 10 The CIA and the Cull of Intelligence
Gulick. either under direct CIA control or under Pentagon
auspices. Green Berets participated, for example, in what
was the CIA's single large-scale Latin American intervention
of the post-Bay of Pigs era. This occurred in the mid-196Qs,
when the agency secretly came to the aid of the Peruvian
government, then plagued by guerrilla troubles in its remote
eaxtem regions. Unable to cope adequately with the insur-
gent movement, Lima had turned to the U.S. government
for aid, which was immediately and covertly forthcoming.
The agency financed the construction of w hat one experi-
enced observ er described as "a miniature F'ort Bragg" in the
troubled Peruvian jungle region, complete with mess halls,
dasKTooms, barrscks, adminutralive buildings, parachute jump
towers, amphibious landing facilities, and all the other accou-
trements of paramilitary operations. Helicopters were fur-
nished under cover of official military aid programs, and the
CIA llew in arms and other combat equipment. Training
was provided by the agency's Special Operations Division
personnel and by Green Beret instructors on loan from the
Army.
As the training progressed and the proficiency of the
cnunterguerrilla troops increased, the Peruvian government
grew uneasy. Earlier, the national military commanders had
been reluctant to provide personnel for the counter-insurgency
force, and thus the CIA had been required to recruit its
fighting manpower from among the available local populace.
By paying higher wages than the army (and offering fringe
benefits, better training, and "esprit de corps") the agency
soon developed a relatively efTicient fighting force. In short
order, the local guerrillas were largely wiped out.
A few months later, when Peru was celebrating its chief
national holiday, the authorities refused to allow the. CIA-
trained troops into the capital for the annual military parade.
Instead, they had to settle for marching through the streets
of a dusty provincial town, in a satellite observance of the
great day. Realizing that many a Latin American regime had
been toppled by a crack regiment, Peru's leaders were un-
willing to let the CIA force even come to Lima, and the
government soon moved to dismantle the unit.
As large and successful as the CIA's Peruvian operation
might have been, it was outweighed in importance among
agency leaders by a smaller intervention in Bolivia that
Special Operations
111
occurred in 1967; for the CIA was out for bigger game
in Bolivia than jiwl local insurgents. The target was Che
Guevara.
The Tracking of Che
When he vanished from the Cuban scene in the spring of
1965, there were reports that Ernesto "Che" Guevara, the
Argentinian physician and comrade-in-arms of Fidel Castro,
had challenged the Cuban leader's authority and, as a result,
had been executed or imprisoned. There were other reports
that Guevara had gone mad, beyond all hope of recovery,
and was under confinement in a villa somewhere in the
Cuban provinces. And there were still other reports that
Che had formed a small cadre of dedicated disciples and had
gone off to make a new revolution. At first no one in the
CIA knew what to believe. But eventually a few clues to
Guevara's whereabouts began to dribble in from the agency's
field stations and bases. They were fragmentary, frustrat-
ingly flimsy, and, surprisingly, they pointed to Africa — to
the Democratic Republic of the Congo, now called Zaire.
Yet another insurrection was going on in the former Belgian
colony, and information from the CIA's operatives in the
field indicated that foreign revolutionaries were participating
in it. Some of their tactics suggested the unique style of Che
Guevara.
Before the intelligence could be verified, however, the
rebellion in the eastern inland territories suddenly evaporated.
By the fall of 1965, Lake Tanganyika was again calm. But the
CIA mercenaries (some of them veterans of the Bay of Pigs
operation), who had been assisting the Congo government in
repressing the revolt, were convinced, as were their agency
superiors in Africa, that Che had indeed been in the area.
Later it was learned by the CIA that Guevara and a group
of more than 100 Cuban revolutionaries had infiltrated into
the Congo from neighboring Tanzania in the spring of 1965.
They intended to set. Africa aflame with rebellion, but their
revolutionary zeal was not matched by that of the native
guerrillas or the local populace. In disgust, six months later
Che secretely returned to Cuba to lay plans for his next
adventure. At the time, however, the CIA knew only that
he had once again disappeared. Again conflicting reports as
to his whereabouts and status, health and otherwise, began
112
The CIA and the Cull of Intelligence
10 drift into the agency. By early 1%7, almost a year and a
half later, the information available to the agency pointed to
the heart of South America, to Bolivia.
While many of the officers in the CIA's Clandestine Ser-
vices firmly believed that Guevara was behind the insurgent
movement in the southern mountains of Bolivia, a few of the
agency's top officials hesitated to accept the fact. Despite
the air of doubt, some agency special operations pcriionnel
wtTt sent to the land-locked South American country to
assist local forces in dealing with the rebel movement.
Ironically, at this point not even Bolivian President Reni
Barrientos thought that Guevara was involved in the guer-
rilla movement.
A couple of months later, in April, two events occurred
that dramatically underscored the belief of the CIA's clandes-
tine operators, both in Bolivia and at headquarters, that Che
was leading the rebels. Early in the month a Bolivian army
unit overran the base camp of the guerrillas at Nancahuazii,
capturing documents, diaries, and photographs which the
fleeing insurgents had left behind. Included in the materials
seized at the guerrilla base camp were photographs of a
partially bald, gray-haired man with glasses who. upon close
examination of certain features, bore a striking resemblance
to Che Guevara. In addition, a couple of smudged finger-
prints on some of the documents seemed to match Guevara's.
The documents, furthermore, clearly established that a num-
ber of the guerrillas operating in Bolivia were Cubans, proba-
bly some of the same men who were thought to have been
with Guevara in the Congo.
Ten days later Regis Debray, the leftist French journalist,
who had disappeared months earlier upon arriving in Bolivia
to do a geopolitical study, was captured near Muyupampa,
along with two other foreigners suspected of having been in
contact with the rebels. According to his statements months
later, the journalist Debray was saved from summary execu-
tion by the CIA men accompanying the Bolivian forces who
captured him. Afterward he was confronted with secret evi-
dence by these same CIA operatives, disclosing that the
agency knew a great deal more about his activities abroad
and in Bolivia than he had thought possible. Denying, at
first, any knowledge of Guevara's connection with the rebel
movement, Debray soon wilted and began to talk in an
attempt to save himself from trial and execution.
Special Operations
113
Even with the rapidly mounting evidence. Director Rich-
ard Helms still could not accept that the legendary Cuban
revolutionary had indeed reappeared to lead another rebellion.
He scoffed at the claims of his clandestine operatives that
they had acquired proof of Guevara's presence in Bolivia;
Helms guessed Che was probably dead. Thomas Karames-
sines, then chief of the CIA's Clandestine Services, who had
presented the case to the Director, would not, however,
back down from the contention that his operatives were now
hot on Guevara's trail, and Helms' attitude seemed to spur
the clandestine operators to greater efforts. More agency
"advisors," iiidudiii|> Cuban veterans of the Bay of Pigs
adventure, were soon dispatched to Bolivia to assist in the
tracking down of Guevara. A team of experts from the
Army's Special Forces was sent to La Paz from the Canal
Zone to train Bolivian "rangers" in the art of counterinsur-
gency operations.
The Clandestine Services were obsessed with Guevara,
and even somewhat fearful of him. He was in part a constant
and irritating reminder of their failure in the Cuban operation.
Unable to vent their frustrations and anger against those
U.S. officials who had undercut that desperate effort, and
incapable of gaining direct retribution by destroying Fidel
himself or his Soviet and Chinese allies, the CIA's Clandes-
tine Services were left to brood over their failure — until
Guevara exposed himself. In so doing he presented himself
to the CIA as an inviting target; his capture or death would
provide some measure of revenge for past failures.
During the summer of 1967, while the agency's special ops
experts were assisting the Bolivian army in hunting down
Guevara, information as to his entry into Bolivia became
available. It was learned that in November 1966 he had come
to La Paz from Havana, via Prague, Frankfurt, and Sao
Paulo, traveling on a false Uruguayan passport and disguised
as a balding, gray-haired merchant with horn-rimmed spec-
tacles — a far cry from the familiar poster picture. He had
been preceded by fifteen Cubans who would assist him in his
Bolivian venture. There was no longer any doubt in anyone's
mind that Che Guevara was in the country and in charge of
the guerrilla movement in the southern mountains. Both
President Barrientos and Helms now accepted the fact. The
Bolivian government offered a reward (S4,200) for Guevara —
114
The CIA and the Cult of Intelligence
dead or alive. It was only a matter of time until Che would
be run into the ground.
In the months that followed, the guerrillas suffered defeat
after defeat at the hands of the American-trained, CIA-
advised Bolivian rangers. One battle, on the last day of
August, resulted in the death of the mysterious Tania, the
lone female in Guevara's rebel band. Although she evidently
was a Cuban mtcliigence agent, a link between the guerrillas
and Havana, it was rumored by the CIA that the East
German woman was actually a double agent. Her employer
supposedly was the Soviet KGB, which, like the CIA, wanted
to keep tabs on Guevara's Cuban-sponsored revolutionary
activities in Latin America. Less than six weeks later, on
October K, Guevara himself was wounded und captured near
the small mountain village of La Higuera.
As they had done for Debray earlier, the CIA advisors
with the Bolivian army tried to bring Guevara back alive to
La Paz for in-depth interrogations. The Bolivian commander,
however, was under orders to execute Guevara. All that was
to be brought back were the head and hands — incontestable
proof that Che had failed in his mission and was dead.
While the CIA advisors stalled the Bolivian colonel, the
agency's station chief in La Paz tried to convince President
Barnentos of the long-range advantages of bringing Guevara
out of the mountains as a prisoner of the government.
Barrientos was adamant. He argued that the Debray affair
had caused enough difficulty, and that the arrival of Che
Guevara, alive, in the capital might spark disturbances among
the students and leftists which his government would not be
able to control. In desperation, the station that night ap-
pealed to Langley headquarters for assistance, but to no
avail.
Going on the assumption that neither the station nor
headquarters would be successful in getting Barrientos to
change his position, the Senior CIA operative at La Higuera,
(DELETED) attempted to question Che. The revolutionary,
however, would not cooperate. He was willing to discuss
p>olitical philosophies and revolutionary movements in general,
but he refused to permit himself to be interrogated about the
details of his operation in Bolivia or any of his previous
guerrilla activities elsewhere. The CIA would have to settle
for the contents of his personal diary, which he had been
carrying at the time of his capture.
Special Operations
115
Final word came from the capital early the next morning.
The prisoner was to be executed on the spot and his body,
strapped to the landing gear of a helicopter, was to be flown
to Vallegrande for inspection at a local laundry house by a
small group of reporters and government offlcials. After-
ward the corpse was to be buried in an unmarked grave
outside of town. On hearing the order, (DELETED) the
CIA operative, hurried back to the schoolhouse where
Guevara was being held, to make one last attempt at interro-
gating Che. There was not much time left; the execution was
to be carried out in the next hour or two.
Guevara's last moments were recorded in a rare, touching
message to headquarters from the CIA operator. The Cuban
veteran, and agency contract officer, noted that Guevara
was at first still confident of somehow surviving his ordeal,
but when he finally realized that he was about to die, his
pipe fell from his mouth. Che, however, quickly recovered
his comp>osure and asked for some tobacco. His painfully
wounded leg no longer seemed to bother him. He accepted
his fate with a sigh of resignation, requesting no last favors.
(DELETED) clearly felt admiration for the revolutionary
and compassion for the man he had helped to capture and
thereby condemn. Minutes later Che Guevara was dead.
The following summer Che's diary suddenly surfaced and
soon found its way into the hands of his comrades in Havana
and certain American admirers (Rampart! magazine), who
immediately verified its authenticity and published it, much
to the chagrin of the CIA and the Bolivian government,
which had been releasing only those portions which but-
tressed their case against Guevara and his rebels. In the
midst of the confusion, charges, and countercharges, Anto-
nio Arguedas, Bolivian Minister of the Interior, disappeared
in July among rumors that he had been the one who had
released the document. Arguedas, as Minister of the Interior,
was in charge of the Bolivian intelligence service, with which
the agency had many close connections. And Arguedas him-
self was an agent of the CIA.
It was quickly learned that Arguedas had escaped to Chile,
where he intended to ask for political asylum. Instead, au-
thorities there turned him over to the CIA station, and the
agency man who had been his original case officer was
dispatched from headquarters to Washington to cool him
off. But despite the CIA's counsel, Arguedas spoke out
116
The CIA and the Cult o f Intelligence
publicly against the agency and its activities in Bolivia. He
denounced the Barrientus regime as a tool of American
imperialism, criticized the government's handling of the
Guevara affair, and then disappeared again, precipitating a
major political crisis in Bolivia.
At various times during the next several months of 1968,
Arguedas popped up in London, New York, and Peru.
Alternately cajoled and threatened at each stop by CIA
operatives who wanted him to shut up, the former minister
nevertheless admitted he had been the one who had released
Che's diary because, he said, he agreed with the revolu-
tionary's motives of attempting to bring about popular social,
political, and economic change in Bolivia and elsewhere in
Latin America. And ultimately, much to the horror of the
CIA and the Barrientos government, Arguedas announced
that he had been an agent of the CIA since 1965 and claimed
that certain other Bolivian officials were also in the pay of
the secret agency. He described the circumstances under
which he had been recruited, charging that the CIA had
threatened to reveal his radical student past and ruin his
political career if he did not agree to participate in its
operations.
Eventually the CIA was able to strike a bargain with
Arguedas, and he voluntarily returned to Bolivia — apparently
to stand trial. He told a New York Times reporter on the
flight from Lima to La Paz that should anything untoward
happen to him, a tape recording detailing his accusations
against the CIA and the Barrientos government would be
delivered to certain parties in the United States and Cuba.
The tape, he said, was being held for him by Lieutenant
Mario Ter^n. Terin, inexplicably, was previously identified
as Che Guevara's executioner.
Arguedas, during his interview, hinted at the magnitude
of his potential revelations by disclosing the names of several
CIA officers with whom he had worked in the past: Hugo
Murray, chief of station; John S. Hilton, former COS; Colo-
nel Ed Fox; Larry Stemfield; and Nick Lendiris. He also
identified some of the agency's contract oflicers who had
assisted in the tracking down of Guevara: J olio Gabriel
Garcia (Cuban), and Eddie and Mario Gonzales (Bolivians).
Arguedas credited the Gonzales brothers with having saved
Debray's life. He now claimed, however, that Barrientos
and even the U.S. ambassador were unaware of the full
Special Operations
117
scope of the CIA's penetration of the Bolivian government,
undoubtedly a concession to the powers that arranged his
safe return to La Paz.
The Tinal chapter in the episode was acted out the follow-
ing summer, almost two years after Che Guevara'a death.
President Ren^ Barrientos was killed in a helicopter crash
while returning from a visit to the provinces. Six weeks later
Antonio Arguedas. the self-admitted agent of the CIA who
had yet to stand trial for treason and releasing Che Guevara's
diary, was apparently shot to death on a street in La Paz. A
month later llerberto Rojas, the guide for the Bolivian
rangers and their CIA advisors during the flnal trackdown of
Guevara, and one of the few people who possibly knew
where the body of the rebel leader was buried, was assassi-
nated in Santa Cruz.
The incriminating tapes Arguedas claimed to have given
to Mario Teran for safekeeping have never surfaced. Arguedas
himself, however, managed to survive the Che episode. In
1970, he mysteriously appeared in Cuba, having brought with
him the death mask and embalmed hands of the charismatic
revolutionary.
5.
PROPRIETARY ORGANIZATIONS
As far as depots of "untraceable arms." airlines
and other installations are concerned, one wonders
how the CIA could accomplish the tasks required
of It in Southeast Asia without such facilities.
— l YMAN KIRKPATKICK
Former CIA Executive Director
U S ,\ew and World Hrpori
October II. 1971
Late one windy spring afternoon in 1971 a small group of
men gathered unobtrusively in a plush suite at Washington's
Mayflower Hotel. The host for the meeting was Professor
Harry Howe Ransom of Vanderbilt University, author of
The Intelligence Establishment, a respected academic study
of the U.S. intelligence system. He was then doing research
for another book on the subject and had invited the others
for drinks and dinner, hoping to gather some new material
from his guests, who included ex-CIA officials, congres-
sional aides, and David Wise, co-author of The Invisible
Government and The Espionage Establishment, two of the
best books on the CIA and clandestine intelligence opera-
tions ever published. Someone brought up the CIA's use of
front companies.
"Oh, you mean the Delaware corporations," said Robert
Amory, Jr., a former Deputy Director of the CIA. "Well, if
the agency wants to do something in Angola, it needs the
Delaware corporations."
By "Delaware corporations" Amory was referring to what
are more commonly known in the agency as "proprietary
corporations" or, simply, "proprietaries." "These are ostensi-
bly private institution's and businesses which are in fact fi-
nanced and controlled by the CIA. From behind their
commercial and sometimes non-profit covers, the agency is
able to carry out a multitude of clandestine activities — usually
covert-action operations. Many of the firms are legally incor-
Proprietary Organizations 1 19
porated in Delaware because of that state's lenient regula-
tion of corporations, but the CIA has not hesitated tu use
other states when it found them more convenient.
The CIA's best-known proprietaries were Radio Free Eu-
rope and Radio Liberty, both established in the early 1950s.
The corporate structures of these two stations served as
something of a prototype for other agency proprietaries.
Each functioned under the cover provided by a board of
directors made up of prominent Americans, who \n the
case of RFE incorporated as the National Committee for
a Free Europe and in the case of KL as the American
Committee for Liberation. But CIA officers in the key
management positions at the stations made all the important
decisions regarding the programming and operations of the
stations.
In 1960 when the agency was preparing for the Bay of Pigs
invasion and other paramilitary attacks against Castro's Cuba,
it set up a radio station on desolate Swan Island in the
Caribbean to broadcast propaganda to the Cuban people.
Radio Swan, as it was called, was operated by a New York
company with a Miami address, the Gibraltar Steamship
Corporation. Again the CIA had found a group of distin-
guished people — as usual, corporate leaders with govern-
ment ties — to front for its clandestine activities. Gibraltar's
president was Thomas D. Cabot, who had once been presi-
dent of the United Fruit Company and who had held a high
position in the State Department during the Truman adminis-
tration. Another "stockholder" was Sumner Smith, of
Boston, who claimed (as did the Honduran government) and
his family owned Swan Island and who was president of the
Abington Textile and Machinery Works.
During the Bay of Pigs operation the following year. Ra-
dio Swan ceased its normal fare of propaganda broadcasts
and issued military commands to the invading forces and to
anti-Castro guerrillas inside Cuba. What little cover Radio
Swan might have had as a "private" corporation was thus
swept away. Ultimately, Radio Swan changed its name to
Radio Americas (although still broadcasting from Swan Island)
and the Gibraltar Steamship Corporation became the Van-
guard Service Corporation (but with the same Miami ad-
dress and telephone number as Gibraltar). The corporation,
120 The CIA and the Cull of Inielligence
however, remained a CIA proprietary until its dissolution in
the late 1960s.
At least one other agency proprietary, the Double-Chek
Corporation, figured in the CIA's operations against Cuba.
Double-Chek was founded in Miami (which abounds with
agency proprietaries) in 1959. and, according to the records
of the Florida state government, "brokerage is the general
nature of the business engaged in." In truth, Double-Chek
was used by the agency to provide air support to Cuban exile
groups, and it was Double-Chek that recruited the four
American pilots who were killed during the Bay of Pigs
invasion. Afterward the CIA, through Double-Chek, paid
pensions to the dead fliers' widows and warned them to
maintain silence about their husbands' former activities.
When the CIA intervened in 1964, Cuban exile pilots —
some of whom were veterans of the Bay of Pigs — flew B-26
bombers against the rebels. These piloii were hired by a
company called Caramar (Caribbean Marine Aero Corpora-
lion), another CIA proprietary.
Often the weapons and other military equipment for an
operation such as that in the Congo are provided by a
"private" arms dealer. The largest such dealer in the United
States is the International Armament Corporation, or
Interarmco, which has its main office and some warehouses
on the waterfront in Alexandria, Virginia. Advertising that
it specializes in arms for law-enforcement agencies, the cor-
poration has outlets in Manchester in England, Monte Carlo,
Singapore, Pretoria, South Africa, and in several Latin Ameri-
can cities. Interarmco was founded in 1953 by Samuel
Cummings. a CIA officer during the Korean war. The cir-
cumstances surrounding Interarmco's earlier years are murky,
but CIA funds and support undoubtedly were available to it
at the beginning. Although Interarmco is now a truly private
corporation, it still maintains close ties with the agency. And
while the CIA will on occasion buy arms for specific
operations, it generally prefers to stockpile military materiel
in advance. For this reason, it maintains several storage
facilities in the United States and abroad for untraceable or
"sterile" weapons, which are always available for immediate
use. Interarmco and similar dealers are the CIA's second
most important source, after the Pentagon, of military materiel
for paramilitary activities.
Proprietary Organizations
121
The Air Proprietaries
Direct CIA ownership of Radio Free Europe, Radio Liberty,
and the Bay uf Pigs proprietaries, and direct involvement in
Interarmco are largely past history now. Nevertheless, the
agency is still very much involved in the proprietary business,
especially to support its paramilitary operations. CIA merce-
naries or CIA-supported foreign troops need air support to
fight their "secret" wars, and it was for just this purpose that
the agency built a huge network of clandestine airlines which
are far and away the largest and the most dangerous of all
the CIA proprietaries.
Incredible as it may seem, the CIA is currently the owner
of one of the biggest — if not the biggest — fleets of "com-
mercial" airplanes in the world Agency proprietaries in-
diide Air America, Air A.sia, Civil Air Transport, Inter-
mountain Aviation, Southern Air Transport, (DELETED)
and several other air charter companies around the world.
Civil Air Transport (CAT), the original link in the CIA
air empire, was started in China in 1946, one year before the
agency itself was established by Congress. CAT was an
offshoot of General Claire Chennault's Flying Tigers, and
during its early days it flew missions of every kind in support
of Chiang Kai-shek's unsuccessful effort to retain control of
the Chinese mainland. When Chiang was finally driven out
of China in 1949, CAT went with him to Taiwan and contin-
ued its clandestine air operations. In 1950 CAT was reorgan-
ized as a Delaware corporation under a CIA proprietary
holding company called the Pacific Corporation.
In a top-secret memorandum to General Maxwell Taylor
on "unconventional-warfare resources in Southeast Asia" in
1961, published in The Pentagon Papers, Brigadier General
Edward Lansdale described CAT's functions as follows:
CAT is a commerical air line engaged in scheduled and
nonscheduled air operations throughout the Far East,
with headquarters and large maintenance facilities in
Taiwan. CAT, a CIA proprietary, provides air logistical
support under commercial cover to most CIA and other
U.S. Government agencies' requirements. CAT sup-
ports covert and clandestine air operations by providing
trained and experienced personnel, procurement of sup-
plies and equipment through overt commercial channels.
122
The CIA and the Cull of Intelligence
and the m<iintenance of a fairly large inventory of trans-
port and other type aircraft under both Chinat [Chinese
Nationalist) and U.S. registry.
CAT has demonstrated its capabilities on numerous
occasions to meet all types of contmgency or long-term
covert air requirements in support of U.3. objectives.
During the past ten years, it has had some notable
achievements, including support of the Chinese Nation-
alist withdrawal from the mainland, air drop support to
the French at Dien Bien Phu, complete logistical and
tactical air support for the Indonesian operation, air lifts
of refugees from North Vietnam, more than 200 over-
flights of Mainland China and Tibet, and extensive air
support in Laos during the current crisis. . . .
The air drops at Dien Bien Phu occurred in 19S4 when the
U.S. government decided not to come directly to the assis-
tance of the beleaguered French force but did approve co-
vert military support. 19S4 w<-is also the year of the airlift of
refugees from North Vietnam to the South. These were
non-secret missions, but the CIA could not resist loading
the otherwise empty planes that flew to North Vietnam
with a cargo of secret agents and military equipment to be
used in a clandestine network then being organized in North
Vietnam. Like other guerrilla operations against communist
countries, whether in Europe or Asia, this CIA venture was
a failure.
By "the Indoaeiian operation," I^nsdale waa referring to
the covert air and other military support the CIA provided
to the rebels of the Sukarno govenunenf in 1958.*
The "more than 200 overflights of Mainland China and
Tibet" that Lansdale mentioned occurred mainly during the
1950s (but continued well into the 1960s), when the CIA
supported, on its own and in cooperation with the Chiang
Kai-shek government, guerrilla operations against China.
CAT was the air-supply arm for these operations, and it was
'Allen Pope, the pilot who was shot down and captured during this operation
hy the Indonesian government, was a CAT pilot. Six months after his release
in 1962 he went to work for another CIA proprietary. Southern Air Transport -
The attorney for Southern at that lime was a man named Alex E. Carlson,
who had only a year before been the lawyer for Double-Chelt Corporation
when that CIA proprietary had furnished the pilots for the Bay of Pigs.
Proprietary Organizations 123
in a CAT plane that Richard Fecteau and John Downey
were shot down by the communist Chinese in 19S4.
By the end of the 1950s, CAT had split into three separate
airlines, all controlled by a CIA proprietary' holding company,
the Pacific Corporation. One firm, Air America, took over
most of CAT'S Southeast Asia business; another. Air Asia,
operated a giant maintenance facility on Taiwan. The por-
tion still called CAT continued to fly open and covert char-
ter missions out of Taiwan and to operate Nationalist China's
scheduled domestic and international airline. CAT was best
known for the extravagant service on its "Mandarin Jet,"
which linked Taipei to neighboring Asian capitals.
In 1964, about the time of the mysterious crash of a CAT
plane,* the CIA decided that running Taiwan's air passenger
service contributed little to the mg^ncy's covert mission in
Asia, and that the non-charter portion of CAT should be
turned over to the Chinese Nationalists. But the Nationalists'
own China Air Lines had neither the equipment nor the
experience at that time to take over CAT's routes, and the
Nationalist government was not prepared to allow the CIA
to abandon Taiwan's principal air links with the outside
world. The CIA could not simply discontinue service, be-
cause such action would have offended the Chiang govern-
ment and made uncertain the continued presence of agency's
other proprietaries and intelligence facilities on Taiwan.
The negotiations over CAT's passenger routes dragged on
through the next four years. The CIA was so eager to reach
a settlement that it sent a special emissary to Taiwan on
temporary duty, but his short-term negotiating assignment
eventually turned into a permanent position. Finally, in 1968
another CAT passenger plane — this time a Boeing 727 —
'CAT'S former public-relations director, Arnold Dibble, wrote in the Saturday
Review of May 1 1 . "A highly suspicious crash of a C-46 claimed the lives
of fifty-seven persons, including that of perhaps the richest man in Asia, Dalo
Loke Wan Tho — the Malaysian movie magnate — and several of his starlets
from his Cathay studios. The full story of this crash has yet to be unraveled;
what is known has not been told because it has been kept under official and
perhaps officious wraps. There has never been, for instance, an official airing
of the pan played by two apparently demented military men aboard who had
stolen two radar identification manuals (about the size of a mail-order catalog)
in the Pescadores Islands, hollowed ttiem out with a razor blade so each
would hold a .45 caliber pistol. The manuals and one pistol were found, but
fire and perhaps inadequate investigation marred the evidence. It was never
definitely determined if the weapons had been fired."
124
The CIA and the Cult of Intelligence
crashed near the Taipei airport . Tliis second accident caused
twenty-one deaths and provided that rarest of occurrences
on Taiwan, a spontaneous public demonstration — against
U.S. involvement in the airline. Bowing to public pressure,
the Nationalist government then accepted a settlement with
the agency: China Air Lines took over CAT'S international
flights: CAT. despite the agency's reluctance, continued to
tly domestic routes on Taiwan; and the CIA sweetened the
p>ot with a large cash payment to the Nationalists.
Air America, a spin-off of CAT, was set up in the late
195(>s to accommodate the agency's rapidly growing number
of operations in Southeast Asia. As U.S. involvement deep-
ened in that part of the world, other government agencies —
the State Department, the Agency for International Develop-
ment (AID), and the United States Information Agency
(USIA) — also turned to Air America to transport their peo-
ple and supplies. By 1971, AID alone had paid Air America
more than SS.'? million for charter services. In fact. Air Amer-
ica w.is able to generate so much business in Southeast Asia
that eventually other American airlines took note of the
profits to be made.
One private company. Continental Airlines, made a success-
hil move In (he ■iiid-1960s to lake some of the market away
from Air America. Pierre Salinger, who became an ofTicer
of Continentml after his years as President Kennedy's press
secretary, led Continental's fight to gain its share of the
lucrative Southeast Asian business. The Continental position
was (hat i( was a ques(ionable, if no( illegal, prac(ice for a
governmen(-owned basiness (even a CIA proprie(ary under
cover) (o coinpe(e wi(h (ruly priva(e companies in seeking
govemmen( con(rac(s. The CIA ofTicers who had (o deal
wi(h Con(inen(al were very uncomfortable. They knew (ha(
Salinger had learned during his Whi(e House days of (he
agency's activities in Southeast Asia and, specirically, of Air
America's tie to the CIA. They feared (ha( implici( in
Con(lnen(ars approach for a share of (he Sou(heas( Asian
marke( was (he (hrea( (ha( if (he agency refused (o coopera(e,
Con(inen(al would make i(s case publicly — using informadon
supplied by Salinger. Ra(her (han face (he possibility of
Dnwan(ed publici(y, (he CIA permitted Continental to move
into Laos, where since the late 1960s it has down charter
flights worth millions of dollars annually. And Continental's
best customer is the CIA itself.
Proprietary Organizations
125
But even with Continental flying in Laos, the agency was
able to keep most of the flights for its own Air America.
This CIA airline has done everything from parachuting Meo
tribesmen behind North Vietnamese lines in Laos to drop-
ping rice to refugees in the Vietnamese highlands. Air Amer-
ica has trained pilots for the Thai national police, transported
pKslitical prisoners for the South Vietnamese government,
carried paymasters and payrolls for CIA mercenaries, and,
even before the Tonkin Gulf Resolution, furnished pilots for
secret bombing raids on North Vietnamese supply lines in
Laos. It has also been accused of participating in Southeast
Asia's heroin trade. Air America's operations regularly cross
national boundaries in Southeast Asia, and its flights are
almost never inspected by customs authorities. It has its own
separate passenger and freight terminals at airports in South
Vietnam, Laos, and Thailand. At Udorn, in Thailand, Air
America maintains a large base which is hidden within an
even larger U.S. Air Force facility (which is ostensibly under
Thai government control). The Udorn base is used to sup-
port virtually all of the "secret" war in Laos, and it also
houses a "secret" maintenance facility for the planes of the
Thai, Cambodian, and Laotian air forces.
Before the cease-fire in Vietnam, Air America was flying
125 planes of its own, with roughly 40 more on lease, and it
had about 5,000 employees, roughly 10 percent of whom
were pilots. It was one of America's largest airlines, ranking
I just behind National in total number of planes. Now that the
[ U.S. military forces have withdrawn from the Vietnamese
theater, the role of maintaining a signiflcani American influ-
ence has reverted largely to the CIA — and Air America,
under the circumstances, is finding its services even more in
demand than previously. Even the International Supervisory
and Control Commission, despite the membership of commu-
nist Poland and Hungary, has signed a contract with the CIA
proprietary to support its supervision of the Vietnam cease-
fire. In 1973, Air America had contracts with the Defense
Department worth 541.4 million.
A wholly owned subsidiary of Air America, Air Asia,
operates on Taiwan the largest air repair and maintenance
facility in the Pacific region. Established in 1955, Air Asia
employs about 8,000 people. It not only services the CIA's
own planes, it also repairs private and military aircraft. The
U.S. Air Force makes heavy use of Air Asia and conse-
126
The CIA and the Cull of Intelligence
quently hus not had to build a major maintenance facility of
its own in East Asia, as would have been necessary if the
CIA proprietary' had not been available. Like Air America,
Air Asia is a self-sustaining, profit-making enterprise.
Until the CIA decided to sell it off in mid- 1973, Southern
Air Transport, another agency proprietary, operated out of
offices in Miami and Taiwan. Unlike CAT, Air America,
and Air Asia, it was not officially connected with the Pacific
Corporation holding company, but Pacific did guarantee $6.6
million loaned to it by private banks, and Air America
loaned it an additional S6.7 million funneled through yet
another CIA proprietary called Actus Technology. Southern's
role in the Far East was largely limited to flying profitable
routes for the Defense Department. Other U.S. government
agencies have also chartered Southern on occasion. In the
first half of 1972 it received a S2 million AID contract to fly
relief supplies to the new state of Bangladesh.
But within tlie CIA, Southern Air Transport was primarily
important as the agency's air arm for potential Latin Ameri-
can interventions. This was the justiHcation whan the CIA
took control of it in 1960, and it prov ided the agency with a
readily available "air force" to support counterinsurgency
efforts or to help bring down an unfriendly government.
While Southern awaited its call to be the Air America of
future Latin American guerrilla wars, it "lived its cover" and
cut down CIA's costs by hiring out its planes on charier.
A particularly mysterious air proprietary is known within
the agency as Intermountaln Aviation. Its public dealings
are through firms called Aero Associates and Hamilton
Aircraft. Intermountaln specializes in charier flights, air-
plane repair, reconditioning of old military planes, and the
shipment of these planes overseas. It is located on a large
private airfield near Tucson, Arizona, which looks much
like an airforce base: housing is provided for senior personnel;
there is an impressive officers' club, a swimming pool, and
other sports facilities — all purchased and maintained at the
CIA's expense. (One senior agency official often speculated
that the two most pleasant assignments he could think of to
finish his career in luxury were to be chief of station in
Johannesburg, South Africa, and director of Intermountaln
Aviation.)
Intermountaln was founded by die agency in the 1950s
primarily for the maintenance of CIA aircraft, but it soon
Proprietary Organizations
127
became a parking and storage facility for planes from other
ageiKy proprietaries. Additionally , the agency used it for
the training of both American and foreign mercenaries. V^lien
the CIA brought Tibetan tribesmen to the United Stales in
the late 19SOs to prepare them for Kucrrilla forays into
China, the agency's Intermountain Aviation assisted in the
training program.
Then, in the early 196()s CIA air operations grew by leaps
and bounds with the expansion of the wars in Southeast Asia
and the constant Fighting in the Congo.
intermountain rapidly expanded its operations to the point
where its cover as a commercial air charter and repair
company became difficult to maintain. If nothing else, its
parachute towers looked suspicious to the casual viewer.
The problem of cover was partially solved, however, when
Intermountain landed a Department of the Interior contract
to train smoke jumpers for forest fire control. But a reporter
visiting Tucson in 1966 still wrote. "Anyone driving by could
see more than a hundred B-26s with their armor plate, bomb
bays, and gun ports." Not long after this disclosure appeared
in the press, CIA funds were made available to Intermountain
to build hangars for the parked aircraft. Prying reporters and
the curious public soon saw less.
In 1965, Intermountain Aviation served as a conduit in the
sale of B-26 bombers to Portugal for use in that country's
colonial wars in Africa. The sale directly violated the official
United States policy against arms exports to Portugal for use
in Angola, Mozambique, or Portuguese Guinea. The U.S.
government, at its highest level, had decided to sell twenty
B-26s to Portugal, and the CIA proprietary was following
official orders. Theoretically, the embargo on weapons ex-
ports for use in Portugal's colonies remained intact — but not
in fact. The U.S. government was, thus, doing covertly what
it had forbidden itself to do openly.
Through the spring and summer of 1965, seven B-26s were
flown from Arizona to Lisbon by an English pilot hired by
an ostensibly private firm called Aero Associates. By Sep-
tember the operation's cover had worn so thin that Soviet
and Hungarian representatives at the United Nations specif-
ically attacked the transaction. The American U.N. delega-
tion conceded that seven B-26s had been delivered to Portugal,
but Ambassador Arthur Goldberg stated that "the only in-
volvement of officials of the United Stales has been in prose-
128
The CIA and the Cult of Intelligence
cuting a malefactor against the laws of the country." This
was a simple mistruth. Ambassador Goldberg, however, may
have not known what the facts were. Adiai Stevenson before
him had not been fully briefed on the Bay of Pigs invasion
and wound up unknowingly making false statements at the
U.N.
The same techniques were used to distort the prosecution
of the "malefactor." Ramsey Clark, at the time Deputy
Attorney General, got in contact with Richard Helms, when
the latter was the CIA's Deputy Director, and the agency's
General Counsel, Lawrence Houston, to discuss the Portu-
guese airplane matter. Agency officials assured Clark that
the CIA had not been involved. Recalling the case, Clark
says, "We couldn't have gone to trial if they [the CIA] had
been involved. I don't see how you can just prosecute the
little guys acting in the employ of a government agency."
Still, the United States had been exposed as violating its
own official policy, and, for political reasons, those knowl-
edgeable about the facts refused to intervene to aid "the
little guys." Thus, one agency of the government, the Justice
Department, unwittingly found itself in the curious position
of prosecuting persons who had been working under the
direct orders of another government agency, the CIA. Five
indictments were finally secured, but one of the accused fled
the country, and charges against two of the others were
dropped. But in the fall of 1966 the English pilot, John
Richard Hawke, and Henri Marie Franqois de Marin de
Montmarin, a Frenchman who had been a middleman in the
deal, were brought to trial in a Buffalo, New York, federal
court.
Hawke admitted in court, "Yes, I flew B-26 bombers to
Portugal for use in their African colonies, and the operation
was arranged through the State Department and the CIA."
However, CIA General Counsel Houston flatly denied un-
der oath that the agency had been involved in the transaction.
Houston did reveal that the agency "knew about" the bomber
shipment on May 25, 1965, five days before it began, and that
this information had been passed on to the State Depart-
ment and eleven other government agencies. He also said
that on July 7 the CIA was "informed" that four of the B-26s
had actually been delivered to Portugal; again the CIA gave
notice to State and other agencies. He did not explain why,
if the U.S. government had so much intelligence on the
Proprietary Organizations
129
flights, nothing was done to stop them, although their flight
plans had been filed with the Federal Aviation Administra-
tion and Hawke, on one mission, even inadvertently buzzed
the White House.
The jury found Hawke and Montmarin innocent. Mem-
bers of the panel later let it be known that they had not been
convinced that the two accused had deliberately violated the
law.
. . . Prior to the appointment of John McCone as the
Agency's Director in 1962, . . . main aircraft was . . . McCone
had been used to much more luxurious transport in his previ-
ous career as a corporation president, and the first time he
saw . . ., he delivered an angry tirade about the need for
finding a plane more suitable to his position. The Agency's
Support Directorate promptly bought . . . outfitted in plush
executive style. McCone made extensive use of . . . plane, but
he also allowed other senior CIA officers to use it for official
business. *
Former Director Helms, however, refused to fly (DE-
LETED) because he believed that its commercial cover was
too transparent. He preferred instead to travel on legitimate
commercial airlines. Less reluctant was Vice President Hu-
bert Humphrey, who often used (DELETED) Gulfstream
during his 1968 Presidential campaign.
CIA's air empire . . . There have been at least two CIA
proprietaries . . . One, . . When not serving the Agency,
this proprietary "lived its cover" . . . The other . . . propri-
etary was . . . awaiting orders from the Agency.
Perhaps the CIA's most out-of-the-way proprietary was
located in Katmandu, Nepal. It was established to provide
air support for agency-financed and -directed tribesmen who
were operating in Chinese-controiled Tibet. CAT originally
flew these missions, as indicated by General Lansdale's refer-
ence to CAT'S "more then 200 overflights of Mainland China
and Tibet." But flying planes from Taiwan to the CIA's
* McCone s desire for com fori and symbob of power came oui several limes in
his firsi few monlhs as CIA Direclor. He insisted that ihe Agency's rather
austere executive suite be completely rebuilt. His offices and those of his Deputy
Director were enlarged, paneled in wood, and impressively furnished. He
demanded — a.nd received — a limousine of the type usually reserved for Cabinet-
level officers. And when he learned that the Agency had no executive dining
room, he ordered that one be built. A large part of the CIA 's executive suite
was then convened into a private dining room and decorated in the traditional
fashion of a men's club.
130
The CIA and the Cult of Intelligence
operational base in northeastern India proved too cumber-
some; thus the Nepalese proprietary was set up. As the
Tibetan operations were cut back and eventually halted dur-
ing the 1960s, this airline was reduced in size to a few
planes, helicopters, and a supply of spare parts. Still, up to
the late 1960s, it flew charters for the Nepalese government
and private organizations in the area.
The CIA's Planning, Programming, and Budgeting Staff
back in Langley believed that the airline's usefulness as an
agency asset had passed, and the decision was made to sell it
off. But, for the CIA to sell a proprietary is a very difficult
process. The agency feels that it must maintain the secrecy
of its covert involvement, no matter how moot or insignifi-
cant the secrecy, and it does not want to be identified in any
way, either before or after the actual transaction. Moreover,
there is a real fear within the Clandestine Services that a
profit will be made, and then by law, the CIA would be
obliged to return the gain to the U.S. Treasury. The clandes-
tine operatives do not want to be troubled by the bureau-
cratic red tape this would entail. It simply goes against the
grain of the clandestine mentality to have to explain and
justify such a transaction to anyone — let alone to the book-
keepers at the Treasury.
Unloading Southern Air Transport in 1973 proved to be
something of a fiasco for the agency. Following past practice,
the CIA tried to sell it quietly to a former employee —
presumably at an attractive price — but the effort failed when
three legitimate airlines protested to the Civil Aeronautics
Board. They complained that Southern had been built up
with government money, that it had consequently received
lucrative charter routes, and that it represented unfair
competition. When word of this prospective sale got into the
newspapers, the CIA backtracked and voluntarily dropped
Southern's CAB certification — greatly reducing the airline's
value but guaranteeing that the agency could sell it off in
complete secrecy.
And with the Nepalese airline, CIA found a buyer who had
previously worked for other agency air proprietaries. Since
he was a former "company man," secrecy was preserved. He
was allowed to purchase the airlines for a small down payment.
Following highly unorthodox business procedure, the airline
itself served as collateral for the balance due. A CIA auditor
at headquarters privately described the sale as a "giveaway,"
Proprietary Organizations 131
but this was the way the Clandestine Services wanted the
afTair handled. The new owner remained in Miami although
all his airlines' operations were in Nepal. Within a compara-
tively short period of time, he liquidated all the airline's
assets. He wound up with a considerable profit, but the
agency made back only a fraction of its original costs. The
Clandestine Ser>'ices was pleased with the sale, in any case,
because it had been able to di^'est itself of a useless asset in a
way both to guarantee maximum security and to assure the
future loyally and availability of the buyer.
A somewhat similar sale of a proprietary occurred . . .
when CIA decided to get rid of a . . . had become increasingly
less valuable to the Agency, and its annual cost . . . could no
longer be justified. But the key employees . . . were eager to
preserve their jobs and resisted the sale. It was feared at
headquarters that one or more of these people might make
public CIA 's relationship . . . if an amicable settlement were
not worked out. The Agency took the problem to . . . would
buy . . . CIA agreed, and the . . . was sold . . . in what was
described in some circles of the Agency as a "sweetheart
deal."
While the ethics of transactions of this sort are questionable,
conflict of interest laws presumably do not apply to the CIA;
the Central Intelligence Agency Act of 1949 conveniently
states that "The sums made available to the Agency may be
expended without regard to the provisions of law and regula-
tions relating to the expenditure of Government funds." In
any case, the use of proprietary companies opens up to the
participants an opportunity to make substantial profits while
"living their cover."
The fact remains that CIA proprietaries are worth hun-
dreds of millions of dollars, and no one outside the agency is
able to audit their books. And, as will be seen later in this
chapter, CIA headquarters sometimes has only the vaguest
notion about what certain proprietaries are doing or what
their assets are. Undoubtedly, there are wide opportunities
for abuse, and many of the people involved in fields such as
the arms trade, paramilitary soldiering, and covert air opera-
tions are not known for high ethical standards. While only a
few agency career employees would take money for personal
gain, there is little to prevent officers of the proprietaries
from doing so, if they are so inclined.
132
The CIA and the Cull of Intelligence
As can be seen, the CIA's proprietary corporations serve
largely in support of special, or paramilitary, operations.
Some, of course, were established for propaganda and
disinformation purposes and, like most other covert assets,
proprietaries can also be used on occasion to further the
espionage and counterespionage efforts of the Clandestine
Services. In the main, however, there has been a definite
trend in the agency for more than a decade to develop the
air proprietaries as the tactical arm for the CIA's secret
military interventions in the Third World. The fleets of these
CIA airlines have been continually expanded and modern-
ized, as have been their base facilities. In the opinion of
most CIA professionals, the agency's capabilities to con-
duct special operations would be virtually nonexistent with-
out the logistical and other support provided by the air
proprietaries.
The performance or the Pacific Corporation and its sub-
sidiaries, Air America and Air Asia, in assisting the CIA's
many special ops adventures over the years in the Far East
and Southeast Asia has deeply impressed the agency's
leadership. The explnit.s of the contract air oflicers in that
$trire>riddcn corner of the world have become almost legend-
ary within the CIA. Furthermore, the advantages of having
a self-sustaining, self-run complex which requires no CIA
funds and little agency manpower are indeed much appreci-
ated by the Clandestine Services.
Without the air proprietaries, there could have been no
secret raids into Communist China. There could have been
no Tibetan or Indonesian or Burmese operations. And, most
important of all, there could have been no "secret" war in
Laos. Even many of the CIA's covert activities in Vietnam
could not have been planned, much less implemented, with-
out the assurance that CIA airlines were available to support
such operations. Thus, it is small wonder that the agency,
when it moved to intervene in the Congo (and anticipating
numerous other insurgencies on the continent), hastily tried
to develop the same kind of air support there that tradition-
ally was available to special operations in Asia. And one can
easily understand why the planners of the Bay of Pigs opera-
tion now regret not having made similar arrangements for
their own air needs instead of relying on the U.S. armed
forces.
Proprietary Organizations 133
The Fabulous George Doole
Although the boards of directors of the air proprietaries are
studded with the names of eminently respectable business
leaders and financiers, several of the companies' operations
were actually long in the hands of one rather singular man,
George Doole, Jr. Until his retirement in 1971, Doole's
official titles were president of the Pacific Corporation and
chief executive officer of Air America and Air Asia; it was
under his leadership that the CIA air proprietanes blossomed.
Doole was known to his colleagues in the agency as a
superb businessman. He had a talent for expanding his air-
lines and for making them, functionally if not formally, into
profit-making concerns. In fact, his proprietaries proved some-
thing of an embarrassment to the agency because of their
profitability. While revenues never quite covered all the
costs to the CIA of the original capital investment, the huge
contracts with U.S. government agencies resulting from the
war in Indochina made the Pacific Corporation's holdings
(CAT, Air America, and Air Asia) largely self-sufficient
during the 1960s. Consequently, the CIA was largely spared
having to pay in any new money for specific projects.
Some of the agency's top officials, such as the former
Executive Director-Comptroller and the chief of Planning,
Programming, and Budgeting, felt uncomfortable with the
booming business Doole managed, but they did nothing to
change it. The Executive Director once privately explained
the inaction: "There are things here better left undisturbed.
The point is that George Doole and CAT provide the agency
with a great number of services, and the agency doesn't have
to pay for them." Among the other services he provided was
his ability as a straight-faced liar: asked by the New York
Times in 1970 whether his airlines had any connection with
the CIA, Doole said: "If 'someone out there' is behind all
this, we don't know about it." At that time Doole had been
working for the CIA for seventeen years, and for most af
those years had held a CIA "supergrade" position.
Doole's empire was formally placed under the CIA's Direc-
torate of Support on the agency's organization chart, al-
though many of its operations were supervised by the
Clandestine Services. But so little was known inside CIA
headquarters about the air proprietaries which employed
almost as many people as the agency itself (18,000) that in
134
The CIA and the Cult o f Intelligence
1965 a CIA offlcer with extensive Clandestine Services experi-
ence was assigned to make a study of their operations for the
agency's top officials.
This officer spent the better part of a year trying to assem-
ble the relevant data, and he became increasingly frustrated
as he proceeded, lie found that the various proprietaries
were constantly trading, leasing, and selling aircraft to each
other:' that the tail numbers of many of the planes were
regularly changed; and that the mixture of profit-making and
covert flight made accounting almost impossible. He finally
put up a huge map of the world in a secure agency confer-
ence room and used flags and pins to try to designate what
proprietaries were operating with what equipment in what
countries. This officer later compared his experience to
trying to assemble a military order of battle, and his estimate
was that his map was at best 90 percent accurate at any given
time. Finally, Helms, then Deputy Director, was invited in
to see the map and be briefed on the complexity of the
airlines. A witness described Helms as being "aghast."
That same year the Executive Committee for Air (Ex Comm
Air) was formed in order to keep abreast of the various air
proprietaries. Lawrence Houston, the agency's General
Counsel, was appointed chairman, and representatives were
appointed from the Clandestine Services, the Support
Directorate, and the agency's executive suite. But the pro-
ceedings were considered so secret that Ex Comm Air's
executive secretary was told not to keep minutes or even notes.
In 1968, Ex Comm Air met to deal with a request from
George Doole for several million dollars to "modernize"
Southern Air Transport. Doole's justification for the money
was that every major airline in the world was using jets, and
that Southern needed to follow suit if it were to continue to
"live its cover." Additionally, Doole said that Southern should
have equipment as effective as possible in the event the
agency had to call on it for future contingencies in Latin
America.
Previous to Doole's request, the agency's Board of Na-
tional Estimates had prepared a long-range assessment of
events in Latin America. This estimate had been approved
*Thc CAT jcl Ihal crashed on Taiwan In lUfi!) was on lease from Southern Air
Transport.
Proprietary Organizations 135
by the Director and sent to the President as the official
analysis of the intelligence community. The conclusions were
generally that political, economic, and social conditions in
Latin America had so deteriorated that a long period of
instability was at hand; that existing American policy was
feeding this instability; and that there was little the United
State« could do, outside of providing straight economic and
humanitarian assistance, to improve the situation. The esti-
mate strongly implied that continued open U.S. intervention
in the internal affairs of Latin American nations would only
make matters worse and further damage the American im-
age in that region.*
At the meeting on Southern Air Transport's modernization
request, Doole was asked if he thought expanding Southern's
capabilities for future interventions in Latin America con-
formed with the conclusions of the estimate. Doole remained
silent, but a Clandestine Services officer working in para-
military affairs replied that the estimate might well have
been a correct appraisal of the Latin American situation and
that the White House might accept it as fact, but that non-
intervention would not necessarily become official American
policy. The Clandestine Services man pointed out that over
the years there had been other developments in Latin
America — in countries such as Guatemala and the Domini-
can Republic — where the agency had been called on by the
White House to take action against existing political trends;
that the CIA's Director had a responsibility to prepare esti-
mates for the White House as accurately as possible; but
that the Director (and the Clandestine Services and Doole)
also had a responsibility to be ready for the worst possible
contingencies.
In working to strengthen Southern Air Transport and his
other proprietaries, Doole and the Clandestine Services were
following one of the basic maxims of covert action: Build
assets now for future contingencies. It proved to be persua-
sive strategy, as the Director personally approved Doole's
'This estimate came much closer to recommending future American policy
than almost any other paper previously prepared by the Board of National
Estimates. The board member in charge of its preparation was a former*
division chief and chief of station in the Clandestine Services. He and his
colleagues apparently hoped that the estimate would have a direct bearing on
future agency covert operations in Latin America.
136
The CIA and the Cull of Inielligence
request and Southern received its several million dollars for
jets.*
The meeting ended inconclusively. Afterward the CIA
officer who had been questioning Doole and the Clandestine
Services man was told that he had picked the wrong time to
make a stand.
So if the U.S. government decides to intervene covertly in
the internal affairs of a Latin American country — or elsewhere,
for that matter — Doole's planes will be available to support
the operation. These CIA airlines stand ready to drop their
legitimate charter business quietly and assume the role they
were established for: the transport of arms and mercenaries
for the agency's "special operations." The guns will come
from the CIA's own stockpiles and from the warehouses of
Interarmco and other international arms dealers. The merce-
naries will be furnished by the agency's Special Operations
Division, and, like the air proprietaries, their connection
with the agency will be "plausibly deniable" to the Ameri-
can public and the rest of the world.
Doole and his colleagues in the Clandestine Services have
worked hard over the years to build up the airlines and the-
other assets for paramilitary action. Their successors will
fight hard to retain this capability — both because they want
to preserve their own secret empire and because they believe
in the rightness of CIA clandestine intervention in other
countries' internal affairs. They know all too well that if the
CIA never intervened, there would be little justification for
their existence.
'When the CIA tried to sell off Southern in 1973. only three propeller-driven
planes were listed in its inventory. It is not known what happened to the jets,
but it is a safe bel that somehow they have been transferred to a better-hidden
CIA proprietary.
6.
PROPAGANDA AND DISINFORMATION
In psychological warfare . . . the inlelligence agen-
cies of the democratic countries suffer from the
grave disadvantage that in attempting to damage
the adversary they must also deceive their own
public.
—VICTOR ZORZA
Wtahingion Post
November 15, 1965
By the mid-1960s most of the professionals in the CIA's
Clandestine Services thought that the day of the balloon as
an effective delivery vehicle in propaganda operations had
long since passed. Years before, in the early rough-and-
tumble era of the Cold War, agency operators in West
Germany had often used balloons to carry anti-communist
literature into the denied areas behind the Iron Curtain.
These operations, although lacking in plausible deniability,
normally a prerequisite in covert propaganda efforts, had
scored high — judging from the numerous angry protests issued
by the Soviet Union and its East European satellites.
Since then the propaganda game had evolved into a subtle
contest of wits, and the agency's Covert Action Staff had
developed far more sophisticated methods for spreading ideo-
logical messages. Thus, there was a sense of "deja vu"
among the covert-action staffers when ofncers of the Far East
Division suggested in 1967 that a new balloon operation be
undertaken. The target this time was to be mainland China.
The People's Republic was at that time in the midst of the
cultural revolution. Youthful Red Guards were rampaging
throughout the country, shattering customs and laws alike;
confusion, near chaos, engulfed the nation. But the CIA's
China watchers in Hong Kong and elsewhere on the periph-
ery of the mainland had detected that a reaction was setting
in, especially in southern China around Canton and Foochow
in the provinces of Kwangtung and Fukien. They believed
that a kind of backlash to the excesses of the Red Guards
138
The CIA and ihe Cull of Intelligence
was building, for increasingly groups within the military and
among the workers were beginning to resist the Red Guards
and to call for a return to traditional law and order.
To the agency's operators, these were conditions worth
exploiting. No one really believed that communism could be
eliminated from the mainland, but the short-term political
objectives which might be achieved through covert propa-
ganda were too tempting to pass up. China was an avowed
enemy of the United States, and the CIA felt that each bit of
additional domestic turmoil that could be stirred up made
the world's most populous country — already experimenting
with long-range ballistic missiles — that much less of a threat
to American national security. Furthermore, if Peking could
be kept preoccupied with internal problems, then the likeli-
hood of Chinese military intervention in the Vietnamese
war, in a manner similar to that so effectively employed
years earlier in Korea, could be diminished. Perhaps, too,
China could be forced to reduce its material support to
North Vietnam and to cut back on its export of revolution to
other areas of the developing world.
The operation was accordingly approved by the 303 Com-
mittee (now the 40 Committee) and the agency took its
balloons out of storage, shipping them to a secret base on
Taiwan. There they were loaded with a variety of carefully
prepared propaganda materials— leaflets, pamphlets, news-
papers — and, when the winds were right, launched to float
over the mainland provinces due west of the island. The
literature dropped by the balloons had been designed by the
agency's propagandists to appear as similar as possible in
substance and style to the few publications then being fur-
tively distributed on a small scale by conservative groups
inside China. Names of no genuine anti-revolutionary organi-
zations were used; fictitious associations, some identified
with the army, others with agricultural communes or urban
industrial unions, were invented.
The main thrust of all the propaganda was essentially the
same, criticizing the activities (both real and imaginary) of
the Red Guards and, by implication, those leaders who in-
spired or permitted such excesses. It was hoped that the
propaganda and its attendant disinfon nation would create
Turther reactions to the cultural revolution, on one hand
adding to the growing domestic confusion and on the other
disrupting the internal balance of power among the leader-
Propaganda and Disinformation
139
ship in Peking, The CIA calculated that when the Chinese
realized they were being propagandized, the L.S. govern-
ment could conlidently disclaim any responsibility. The as-
sumed culprit would most likely be Chiang Kai-shek's Taiwan
regime, the agency's witting and cooperative host for the
operation.
Almost immediately after it began, the balloon project was
a success. The CIA's China watchers soon saw evidence of
increased resistance to the Red Guards in the southern
provinces. Peking, apparently believing the reaction to the
cultural revolution to be greater than it actually was, dis-
played strong concern over developments in the south. And
within weeks, refugees and travelers from the mainland
began arriving in Hong Kong with copies of the leaflets
and pamphlets that the agency's propagandists had manu-
factured—a clear indication of the credence being given the
false literature by the Chinese masses. It was not long,
therefore, before the Clandestine Services were searching
for other ways to expand their propaganda effort against the
new target.
A decision was therefore made to install on Taiwan a pair
of clandestine radio transmitters which would broadcast
propaganda— and disinformation— of the same nature as
that disseminated by the balloon drops, if the Chinese peo-
ple accepted the radio broadcasts as genuine, the CIA
reasoned, then they might be convinced that the counter-
movement to the cultural revolution was gaining strength
and perhaps think that the time had come to resist the Red
Guards and their supporters still more openly.
Again the Coven Action Staff relied on imitation. . . . The
Agency's radios were modeled after a handful of authentic
stations. . . . One of the CIA's radios, therefore, . . . the
other . . .
Selling up the radios involved a difficult task for the Agency's
technical experts. . . .
The technicians proved capable of meeting the challenge,
but it was obvious to all associated with the operation that the
Chinese government, which had by now discovered that much
of the counter-revolutionary literature circulating in the southern
provinces was the product of foreign balloon drops, would
after a while determine that the radio broadcasts, . . . Never-
theless, the operators pressed ahead with the project.
Against a closed-society target, simply providing infcirina -
140
The CIA and the Cult of Inielligence
tion and news that the gnvetnmf.n L wishes to keep from its
Dc onle cap have a si j; njfi can( q ffcci. If, in addition, some
clever disinforrmtion can oe inserted, then so much the
better. The listeners, realizing that much of what they are
hearing is true, tend to believe that all they are told is accurate.
One source of news used by agency propagandists was the
CIA's own Foreign Broadcast Information Service (FBIS),
which daily monitors open radio broadcasting around the
world from more than a dozen listening posts located in such
varied places as Hong Kong, Panama, Nigeria, Cyprus, even
San Francisco. The product of the FBIS was also utilized to
determine whether the broadcasts of the clandestine trans-
mitters were reaching their target in China and creating the
anticipated effect.
There was a third (and deleterioHs) way, however, in which
the monitoring service played a role in the operation, and
the Clandestine Services were slow to correct it. Unlike most
of the intelligence collected by the agency, the programs
monitored by the FBIS are widely disseminated within the
U.S. government and to certain subscribers among the press
corps and the academic community. These daily rep>orts,
verbatim transcripts translated into English, are packaged and
color-coded according to major geographical area — Far East
(yellow). Middle East/Africa (blue), Latin America (pink),
andso on. But even though the FBIS editors are members of
the CIA's Intelligence Directorate, the operators in the Clan-
destine Services are reluctant to reveal their propaganda
operations to them. As a result, for its Far East daily report
the FBIS frequently monitored and distributbed the texts of
programs actually originating from the agency's secret stations
on Taiwan along with the transcripts of broadcasts from real
counter-revolutionary organizations on the mainland.
CIA operators seemed untroubled by this development
and the accompanying fact that the agency's own China
analysts back at headquarters in Washington (along with
their colleagues in the State and Defense departments) were
being somewhat misled. Nor did they appear to mind that
unwitting scholars and newsmen were publishing articles based
to some extent on the phony information being reported by
the FBIS. Eventually the CIA analysts at home were in-
formed of the existence of the clandestine radios, but no
steps were taken to rectify the false data passed on to the
other U.S. government agencies or to the press and academia;
Propaganda and Disinformation
141
operational security precluded such revelations. Besides, Com-
munist China was an enemy, and the writings of recognized
journalists and professors publicizing its stale of near chaos
and potential rebellion helped to discredit Peking in the eyes
of the world — which was, after all, in keeping with the CIA's
interpretation of American foreign policy at the time. The
CIA's secret radios thu.s proved to be highly .succes.sful, even
after the Chinese government discovered their origin and
announced to its people that the broadcasts were false.
Meanwhile, the agency's operatives turned to outright
disinformation in their effort to e.\ploit China's internal
difficulties. For example,
12 LINES DELETED
began to show results. The Red Guards turned their fury on
the Ministry of Foreign Affairs, demanding that Chinese
diplomats, too, be cleansed of Western ways and rededi-
cated to Mao's principles of communism.
22 LINES DELETED
To be sure, propaganda and disinformation are not new pheno-
mena. Nations and factions within nations have long employed
such techniques to enhance their own images while at the same
time attempting to discredit their enemies and rivals. Yet the
great advances in communications during the twentieth cen-
tury have vastly changed the potential of propagandistic effort,
making possible rapid, widespread distribution of propaganda
material. Nazi Germany refined and made enormous use of
the "big lie." The Soviet Union and other communist countries
have used many of the methods invented by the Germans and
have added new twists of their own. Although the United
States did not actively enter the field until World War II, when
the OSS and the Office of War Information (OWI) started
their psychological-warfare programs, its propaganda effort
has grown — under the eyes of the Covert Action Staff of the
CIA's Clandestine Services — to be thoroughly expert.
Working on the CA Staff are sociologists, psychologists,
historians, and media specialists — all skilled at selecting
"reachable" targets, such as the youth or intellectuals of a
particular country, and at getting a message through to them.
In planning and carrying out its activities, the branch often
142
The CIA and the Cull of Intelligence
works closely with other agency officers, in the area divisions.
The idea for an operation may be initiated by a field
component — say, a station in Africa or Latin America — that
sees a special need or a target of opportunity within its area
of responsibility; it may originate at headquarters in Langley,
either in the propaganda branch or in one of the area divisions;
or it may come from the White House, the State Department,
the Pentagon, or any member of the U.S. intelligence com-
munity in the form of a requirement for the CIA to take
action. If it is considered to be a program of major political
significance or entailing an inherent high-risk factor — that is,
if its exp>osure would cause substantial embarrassment for
the U.S. government — a project proposal developed in the
Clandestine Services is submitted to the Director's office for
review. Subsequently, the plan is sent to the 40 Committee
for final approval. Thenceforth, control of any propaganda
operation and responsibility for its coordination within the
Clandestine Services and the government may rest with ei-
ther the Covert Action Staff or an area division. Certain
longstanding operations, such as Radio Free Europe and
Radio Liberty, were traditionally under the control of the
CA Staff. But responsibility for the newer and smaller opera-
tions usually is determined on an ad hoc basis, with the CA
Staff serving in either an advisory or controlling capacity,
depending on the circumstances of the particular undertaking.
A propaganda operation might not be anything more sinis-
ter than broadcasting straight news reports or rock music to
the countries of Eastern Europe. Others are far more devious.
For example, the CIA used secret agents to plant extremely
negative and often distorted articles about communism in the
Chilean press in the period before the 1970 presidential elec-
tion in that country. The purpose was to discredit the candi-
dacy of Marxist Salvador Allende.
6 LINES DELETED
The CIA also makes considerable use of forged documents.*
During the mid-1960s, for instance, the agency learned that a
*Wa(ergale burglar E. Howard Hunt was questioned in 1973 about his forgery
of a State Department cable directly linking the Kennedy administration to
the assassination of South Vietnamese President Ngo Dinh Diem. "After all."
Hunt told the federal prosecutor, "I had been given some training in my past
CIA career to do just this sort of thing . . . Iloating forged newspaper accounts,
telegrams, that son of thing."
Propaganda and Disinformation
143
certain West African country was about to recognize the
People's Republic of China and that the local government
intended to force the withdrawal of the diplomatic represen-
tatives of Nationalist China. This was considered to be con-
trary to American foreign-policy aims, so the CIA went into
action.
6 LINES DELETED
The Pentagon Papers have revealed some other examples
of CIA propaganda and disinformation activities. One top-
secret document written in 1954 by Colonel Edward Lansdale,
then an agency operator, describes an effort involving North
Vietnamese astrologers hired to write predictions about the
coming disasters which would befall certain Vietminh lend-
ers and their undertakings, and the success and unity which
awaited the South.
Lansdale also mentioned that personnel under his con-
trol hud engineered a black psywar strike in Hanoi:
leaflets signed by the Vietminh instructing Tunkinese on
how to behave for the Vietminh takeover of the Hanoi
region in early October, including items about property,
money reform, and a three-day holiday of workers on
takeover. The day following the distribution of these
leaflets, refugee registration tripled. Two days later
Vietminh took to the radio to denounce the leaflets; the
leaflets were so authentic in appearance that even most
of the rank and file Vietminh were sure that the radio
denunciations were a French trick.
Lansdale's black propaganda also had an effect on the
American press. One of his bogus leaflets came to the atten-
tion of syndicated columnist Joseph Alsop, who was then
touring South Vietnam. The leaflet, indicating that many
South Vietnamese were to be sent to China to work on the
railroads, seemed to have been written by the communists.
Alsop naively accepted the leaflet at face value and, accord-
ing to Lansdale, this "led to his sensational, gloomy articles
later. . . . Alsop was never told this story." Nor, of course,
was the false impression left with Alsop's readers ever
corrected.
CIA propaganda activities also entail the publication of
144
The CIA and the Cult of Intelligence
books and periodicals. Over the years, the agency has pro-
vided direct subsidies to a number of magazines and publish-
ing houses, ranging from Eastern European 6migr6 organs
to such reputable firms as Frederick A. Praeger, of New
York — which admitted in 1%7 that it had published "fifteen
or sixteen books" at the CIA's request.
II LINES DELETED
Many other anti-communist publishing concerns in Ger-
many, Italy, and France were also supported and encour-
aged by the agency during the post-World War II years.
( DELETED ) According to a
former high-ranking agency official,
2 LINES DELETED
and the Parisian newspaper "Le Combat." This same
ex-official also recalls with an ironic smile that for sev-
eral years the agency subsidized the New York commu-
nist paper. The Daily Worker. In fairness to the Worker's
staff, it must be noted that they were unaware of the
CIA's assistance, which came in the form of several
thousand secretly purchased prepaid subscriptions. The
CIA apparently hoped to demonstrate by this means to
the American public that the threat of communism in
this country was indeed real.
Although the CIA inherited from the OSS responsibility for
covert propaganda operations, the agency has no specific
authority in the open law to engage in such operations —
other than the vague charge to carry out "such other func-
tions and duties related to intelligence affecting the national
security as the National Security Council may from time to
time direct." Yet since its founding in 1947 the CIA has spent
over one billion dollars for propaganda activities (mainly
foreign but also domestic) to further what it perceived to be
the national interests of the United States.
Sometimes this means simp ly telling the truth to an aud i-
ence ^called "white" propag anda): otner limes a mixtur~ of
truths , half-truths, an d sligm "Sirtoriions is m> ed to sian i'the
Views o\ Ihe audience ("sray" propa"ga7i(^ra nd, on o ccasion ,
outri ght lies (" black'' prop 3g?ii'tra 7'gn! tiSed, aithougfi' usii-
Propaganda and Disinformation
145
ally accompanied for credibility's sake by some truths and
half-truths.
"Black" propaganda on the one hand and "disinformation"
on the other are virtually indistinguishable. Both refer to the
spreading of false information in order to influence people's
opinions or actions. Disinformation actually is a special type
of "black" propaganda which hinges on absolute secrecy and
which is usually supported by false documents; originally, it
was something of a Soviet specialty, and the Russian word
for it, dezinformatsiya. is virtually a direct analogue of our
own. Within the KGB there is even a Department of
Disinformation.
On June 2, 1961 (less than two months after the CIA's
humiliating failure at the Bay of Pigs), Richard Helms, then
Deputy Director of the Clandestine Services, briefed the
Senate Internal Security Subcommittee on communist for-
geries. Helms discussed thirty-two fraudulent documents
"packaged to look like communications to or from Ameri-
can officials." Twenty-two were meant to demonstrate impe-
rialist American plans and ambitions; seventeen of these
asserted U.S. interference in the affairs of several free-world
countries. Of the seventeen, eleven charged U.S. interven-
tion in the private business of Asian nations. One was a fake
secret agreement between the Secretary of State and Japan-
ese Premier Kishi permitting use of Japanese troops any-
where in Asia. Another alleged that American policy in
Southeast Asia called for U.S. control of the armed forces of
all S.E. A.T.O. nations. Two forgeries offered proof that the
Americans were plotting the overthrow of Indonesia's
Sukarno; the remaining two were merely meant to demon-
strate that the U.S. government, despite official disclaimers,
was secretly supplying the anti-Sukarno rebels with military
aid.
These last examples concerning Indonesia are especially
interesting. A cursory examination of the documents, as
submitted by Helms, indicates that they were indeed rather
crude forgeries, but their message was accurate. Not only
did the CIA in 1958 support efforts to overthrow the Su-
karno government, but Helms himself, as second-ranking
official in Clandestine Services, knew it well. And he knew
that the "official dislaimers" to which he referred were de-
ceptions and outright lies issued by U.S. government
spokesmen. Helms' testimony was released to the public
146
The CIA and the Cult of Intelligence
with the approval of the CIA, which was, in effect, targeting
ci propaganda operation against the American people. Not
only did he lie about the communists' lying (which is not to
say that they are not indeed culpable), but Helms in the
process quite ably managed to avoid discussion of the perva-
sive lying the CIA commits in the name of the United
States.
The Radios
Until 1971. the CIA's largest propaganda operations by far
were Radio Free Europe (RFE) and Radio Liberty (RL).
RFE broadcast to Poland, Hungary, Czechoslovakia, Ro-
mania, and Bulgaria, while RL was aimed at the Soviet
Union. These ostensibly private stations had been started by
the agency in the early 1950s at the height of the Cold War.
They operated under the cover provided by their New York-
based boards of directors, which were made up principally of
distinguished statesmen, retired military leaders, and corpo-
rate executives. With studios in Munich and transmitters in
West Germany, Spain, Portugal, and Taiwan, the two sta-
tions broadcast thousands of hours of programs a year into
the communist countries. Their combined annual budgets
ranged from S30 to S35 million, and the CIA financed over 95
percent of the costs.*
In their early years, both RFE and RL quite stridently
promoted the "rolling back" of the Iron Curtain. (Radio
Liberty was originally named Radio Liberation.) The tone of
their broadcasts softened considerably in the aftermath of
the 1956 Hungarian revolt, when RFE was subjected to se-
vere criticism for its role in seeming to incite continued, but
inevitably futile, resistance by implying that American assis-
tance would be forthcoming. During and after the Hungarian
events, it became quite clear that the United States would
not actively participate in freeing the captive nations, and
*A paniculdrly deceptive aspect of the RFE operation was. and is. the annual
fund-raising drive carried out in the United Slates. Under the auspices of the
Advertising Council. RFE sohcits funds with the clear implication that if
money is not donated by the American public the station will no longer be
able In function and the "truth" will not get through to Eastern Europe.
Although between S12 and S2U million in free advertising time was made
available in IVAU, for example, less than SICXI.IXX) was raised from a not terribly
alarmed public.
Propaganda and Disinformation
147
the emphasis at both RFE and RL was changed to promote
liberalization within the communist system through peaceful
change. The CIA continued, however, to finance both stations,
to provide them with key personnel, and to control program
content.
The ostensible mission of RFE and RL was to provide
accurate information to the people of Eastern Europe. In
this aim they were largely successful, and their programs
reached millions of listeners. While RFE and RL broadcasts
contained a certain amount of distortion, they were, espe-
cially in the early years, considerably more accurate than the
Eastern European media. But to many in the CIA the pri-
mary value of the radios was to sow discontent in Eastern
Europe and, in the process, to weaken the communist
governments. Hard-liners in the agency pointed to the social
agitation in Poland which brought Wladyslaw Gomulka to
power in 1956, the Hungarian uprising in 1956, and the fall of
Czech Stalinist Antonin Novotny in 1967 as events which
RFE helped to bring about. Others in the CIA did not
specifically connect RFE or RL to such dramatic occurrences,
but instead stressed the role of the two stations in the more
gradual de-Stalinization and liberalization of Eastern Europe.
Like most propaganda operations, RFE's and RL's princi-
pal effect has been to contribute to existing trends in their
target areas and sometimes to accentuate those trends. Even
when events in Eastern Europe have worked out to the
agency's satisfaction, any direct contribution by the radios
would be nearly impossible to prove. In any case, whatever
the success of the two stations, the CIA intended from the
beginning that they play an activist role in the affairs of
Eastern Europe — well beyond being simply sources of accu-
rate news. For, in addition to transmitting information to
Eastern Europe and harassing the communist governments,
RFE and RL have also provided the Clandestine Services
with the covert assets which could be used against the Soviet
Union and Eastern Europe.
The two radio stations, with their large staffs of Eastern
European refugees, are a ready-made source of agents,
contacts, information, and cover for operations. Among fur-
ther radio-derived sources of intelligence was the compara-
tively large number of letters RFE and RL received from
their listeners in Eastern Europe. Delivered by mail and by
travelers coming to the West, these letters were considered
148
The CIA and the Cub of Inielligence
by the agency's clandestine operators to be an intelligence-
collection resource. RFE and RL emigre personnel used the
letters and other information available to the stations to
prepare written analyses of what was happening in the East.
Much of this analysis, however, was thought to be of doubt-
ful value back at CIA headquarters, and was held in low
esteem throughout the U.S. intelligence community.
However debatable the direct effect of RFE and RL on
events in Eastern Europe, the governments of the commu-
nist countries obviously were quite disturbed by the stations.
E.xtensive efforts were made to jam their signals, and by the
late 19S0s the communist intelligence services were actively
trying to discredit the stations and to infiltrate the radios'
staffs. In many cases, they succeeded, and by the mid-1960s
the general view at CIA headquarters was that the two
facilities were widely penetrated by communist agents and
that much of the analysis coming out of Munich was based
on false information planted by oppwsition agents. During
this same time the spirit of East-West diienie was growing,
and many officers in the CIA thought that RFE and RL had
outlived their usefulness. Supporters of the stations were
finding it increasingly difficult at budget time to justify their
yearly costs. Even the Eastern European governments were
showing a declining interest in the stations, and the jamming
efforts fell off considerably.
The agency carried out several internal studies on the
utility of RFE and RL, and the results in each case favored
phasing out CIA funding. But after each study a few old-
timers in the CIA, whose connections with the stations went
back to their beginnings, would come up with new and
dubious reasons why the radios should be continued. The
emotional attachment of these veteran operators to RFE
and RL was extremely strong. Also defending the stations
were those influential personalities, like former N.A.T.O.
chief Lucius Clay, CBS president Frank Stanton, and Gen-
eral Motors chairman James Roche, who made up the radios'
boards of directors. All of these efforts ran counter to at-
tempts of the CIA's own Planning, Programming and Bud-
geting Staff to end agency support. Additionally, the CIA's
top management appeared reluctant to part with the stations
because of a fear that if the S30 to S3S million in annual
payments were ended, that money would be irrevocably lost
to the CIA. Each internal agency study which called for the
Propaganda and Disinformation
149
end of the CIA's involvement invariably led to nothing more
than yet another study being made.
Thus, bureaucratic inertia, the unwillingness of the USIA
to take over the radios' functions, and well-placed lobbying
efforts by RFE and RL boards of directors combined to
keep CIA funds flowing into both stations through the 1960s.
Even when agency financing of the stations became widely
known during the 1967 scandal surrounding the CIA's pene-
tration and manipulation of the National Student Association,
the agency did not reduce its support. In the aftermath of
that scandal. President Johnson's special review group, the
Katzenbach committee, recommended that the CIA not be
allowed to finance "any of the nation's educational or pri-
vate voluntary organizations." Still, with the approval of
the White House, the agency did not let go of RFE or RL.
No change occurred until January 197 1 , when Senator Clif-
ford Case of New Jersey spoke out against the CIA subsidies
to the radios and proposed legislation for open funding.
Case's move attracted quite a bit of attention in the media
and it became obvious that the Senator was not going to
backdown in the face of administration pressure. When the
Senate Foreign Relations Committee scheduled hearings on
Case's bill and the Senator threatened to call former RFE
employees as witnesses, the CIA decided that the time had
come to divest itself of the two stations. Open congressional
funding became a reality, and by the end of 1971 CIA finan-
cial involvement in RFE and RL was officially ended. Whether
the agency has also dropped all its covert assets connected
with them is not known, but, given past experience, that is
not likely. For the tims being, the largest threat to the
future of RFE and RL would seem to be not Congress,
which will probably vote money indefinitely, but the West
German government of Willy Brandt. Now that the stations
are in the open, Bonn faces pressure from the Eastern
European countries to forbid them to broadcast on German
soil.
2 LINES DELETED
but he still might at some point accept the argument, as part
of an effort to further the East-West detente, that RFE and
RL represent unnecessary obstacles to improved relations.
150
The CIA and the Cult of Intelligence
Other Propaganda Operations
The CIA has always been interested in reaching and encour-
aging dissidents in Eastern Europe and the Soviet Union. In
the early days of the Cold War, the agency sent its own
agents and substantial amounts of money behind the Iron
Curtain to keep things stirred up. mostly with disastrous
results. In more recent times, operations against Eastern
Europe and the U.S. S R. have become less Trequent and
less crude. The agency, however, has continued to maintain
its contacts with emigr£ groups in Western Europe and the
United States. These groups are sometimes well informed on
what is happening in their home countries, and they often
provide a conduit for the CIA in its dealings with dissidents
in those countries.
One such group is . . . The main value . . . to the CIA has
been its role . . . the CIA 's ... is obviously a relic of the early
Cold War . . . no American interest would be at all harmed
by a cut-off of . . . and, in fact, a cut-off would have a
beneficial effect. Nevertheless, as was the case with . . . the
CIA has been extremely reluctant to abandon ... a coven
asset, even after the Agency's own Planning and Program-
ming Staff has found the emigre group to be of only
marginal usefulness.
Another organization heavily subsidized by the CIA was
the Asia Foundation. Established by the agency in 1956, with
a carefully chosen board of directors, the foundation was
designed to promote academic and public interest in the
East. It sponsored scholarly research, supported conferences
and symposia, and ran academic exchange programs, with
a CIA subsidy that reached $88 million a year. While
most of the foundation's activities were legitimate, the
CIA also used it, through penetration among the officers
and members, to fund anti-communist academicians in vari-
ous Asian countries, to disseminate throughout Asia a nega-
tive vision of mainland China, North Vietnam, and North
Korea, and to recruit foreign agents and new case officers.
Although the foundation often served as a cover for clandes-
tine operations, its main purpose was to promote the spread
of ideas which were anti-communist and pro-American —
sometimes subtly and sometimes stridently.
The focus of the Asia Foundation's activities was overseas,
but the organization's impact tended to be greater in the
Propaganda and Disinformation
151
American academic community than in the Far East. Large
numbers of American intellectuals participated in founda-
tion programs, and they — usually unwittingly — contributed
to the popularizing of CIA ideas about the Far East.
Designed — and justified at budget time — as an overseas
propaganda operation, the Asia Foundation also was regu-
larly guilty of propagandizing the American people with
agency views on Asia.
The agency's connection with the Asia Foundation came
to light just after the 1967 exposure of CIA subsidies to the
National Student A.ssociiition. The foundation clearly was
one of the organizations which the CIA was banned from
financing and, under the recommendations of the Katzenbach
committee, the decision was made to end CIA funding. A
complete cut-off after 1967. however, would have forced the
foundation to shut down, so the agency made it the benefi-
ciary of a large "severance payment" in order to give it a
couple of years to develop alternative sources of funding.
Assuming the CIA has not resumed covert financing, the
Asia Foundation has apparently made itself self-sufficient by
now.
During the 1960s the CIA developed proprietary compa-
nies of a new type for use in propaganda operations. These
proprietaries are more compact and more covert than rela-
tively unwieldy and now exposed fronts like the Asia Foun-
dation and Radio Free Europe.
27 LINES DELETED
More and more, as the United States cuts back its overt aid
programs and withdraws from direct involvement in foreign
countries, the agency will probably be called upon to carry
out similar missions in other nations.
The CIA has also used defectors from communist govern-
ments for propaganda purposes — a practice which has had
more impact in this country than overseas. These defectors,
without any prodding by the CIA, would have interesting
stories to tell of politics and events in their homelancls, but
almost all are immediately taken under the CIA's control
and subjected to extensive secret debriefings at a special
defector reception center near Frankfurt, West Germany,
or, in the cases of particularly knowledgeable ones, at agency
152
The CIA and the Cult of Intelligence
"safe houses" in the United States. In return for the intelli-
gence supplied about the defector's former life and work,
the CIA usually takes care of his resettlement in the West,
even providing a new identity if necessary. Sometimes, after
the lengthy debriefing has been finished, the agency will
encourage — and will help — the defector to write articles or
books about his past life. As he may still be living at a CIA
facility or be dependent on the agency for his livelihood, the
defector would be extremely reluctant to jeopardize his fu-
ture by not cooperating. The CIA does not try to alter the
defector's writings drastically; it simply influences him to
leave out certain information because of security consider-
ations, or because the thrust of the information runs counter
(o existing American policy. The inclusion of information
justifying U.S. or CIA practices is, of course, encouraged,
and the CIA will provide whatever literary assistance is
needed by the defector. While such books tend to show the
communist intelligence services as diabolical and unprinci-
pled organs (which they are), almost never do these books
descnbe triumphs by the opposition services over the CIA.
Although the other side does indeed win on occasion, the
agency would prefer that the world did not know that. And
the defector dependent on the CIA will hardly act counter to
its interests.
In helping the defector with his writing, the agency often
steers him toward a publisher. Even some of the public-
relations aspects of promoting his book may be aided by the
CIA, as in the case of Major Ladislav Bittman, a Czech
intelligence officer who defected in 1968. Prior to the 1972
publication of his book. The Deception Game, Bittman was
interviewed by the Wall Street Journal, which quoted him on
U.S. intelligence's use of the disinformation techniques. "It
was our opinion," the former Czech operative said, "that
the Americans had more effective means than this sort of
trickery — things such as economic-aid programs — that were
more influential than any black propaganda operation."
While Bittman may well have been reflecting attitudes
held by his former colleagues in Czech intelligence, his words
must be considered suspect. The Czechs almost certainly
know something about the CIA's propaganda and disinfor-
mation programs, just as the CIA knows of theirs. But
Bittman's statement, taken along with his extensive descrip-
tion of Czech and Russian disinformation programs, reflects
Propaganda and Disinformation
153
exactly the image the CIA wants to promote to the Ameri-
can public — that the communists are always out to defraud
the West, while the CIA, skillfully uncovering these deceits,
eschews such unprincipled tactics.
To the CIA, propaganda through book publishing has
long been a successful technique. In 1953 the agency backed
the publication of a book called The Dynamics of Soviet
Society, which was written by Walt Rostow, later President
Johnson's Assistant for National Security Affairs, and other
members of the staff of the Center for International Studies
at the Massachusetts Institute of Technology. The center had
been set up with CIA money in 1950, and this book was
published in two versions, one classiFied (for the CIA and
government policy-makers) and the other unclassified (for
the public). Both versions, except in some minor details,
promoted the thesis that the Soviet Union is an imperialistic
power bent on world conquest, and that it is the responsibil-
ity of the United States to blunt the communist menace.
Most CIA book operations, however, are more subtle and
clandestine. A former CIA official who specialized in Soviet
affairs recalls how one day in 1967 a CIA operator on the
Covert Action Staff showed him a book called The Foreign
Aid Programs of the Soviet Bloc and Communist China by a
German named Kurt Muller. The book looked interesting to
the Soviet expert, and he asked to borrow it. The Covert
Action man replied, "Keep it. We've got hundreds more
downstairs." Muller's book was something less than an unbi-
ased treatment of the subject; it was highly critical of commu-
nist foreign assistance to the Third World. The Soviet specialist
is convinced that the agency had found out Muller was
interested in communist foreign-aid programs, encouraged
him to write a book which would have a strong anti-communist
slant, provided him with information, and then helped to get
the book published and distributed.
Financing books is a standard technique used by all intelli-
gence services. Many writers are glad to write on subjects
which will further their own careers, and with a slant that
will contribute to the propaganda objectives of a friendly
agency. Books of this sort, however, add only a false aura of
respectability and authority to the information the intelli-
gence agency would like to see spread — even when that
information is perfectly accurate — because they are by defini-
tion restricted from presenting an objective analysis of the
154
The CIA and the Cult o f Intelligence
subject under consideration. And once exposed, both the
writer and his data become suspect. The CIA 's most famous
venture in book publishing was The Penkovsky Papers. This
chronicle of spying for the West inside the Kremlin appeared
in 1965, and it was allegedly taken from the journal of the
acituil spy. Colonel Oleg Penkovsky.
Spies, however, do not keep journals. They simply do not
take this kind of risk, nor do they have the time to do so
while they are leading double lives. . . . Tlie Soviet Govern-
ment obviously knew that he had spied for the West, but it
could not be sure of what specific information he had turned
over. . . .
Allen Dulles seemed to be rubbing salt in their wounds
when he wrote in The Craft of Intelligence that the Penkovsky
defection had shaken the Soviet intelligence services with
the knowledge that the West had located Russian officials
willing to work "in place for long periods of time," and
others who "have never been surfaced" and [who] for their
own protection must remain unknown to the public."
And, of course, the publication of The Penkovsky Papers
opened the Soviets up to the embarrassment of having the
world learn that the top level of their government had been
penetrated by a Western spy. Furthermore, Penkovsky's
success as an agent made the CIA look good, both to the
American people and to the rest of the world Failures such
as the Bay of Pigs might be forgiven and forgotten if the
agency could recruit agents like Penkovsky to accomplish
the one task the CIA is weakest at — gathering intelligence
from inside the Soviet Union or China.
The facts were otherwise, however. In the beginning,
Penkovsky was not a CIA spy. He worked for British
intelligence. He had tried to join the CIA in Turkey, but he
had been turned down, in large part because the Soviet Bloc
Division of the Clandestine Services was overly careful not
to be taken in by KGB provocateurs and double agents. To
the skittish CIA operators, Penkovsky seemed too good to
be true, especially in the period following the Burgess-McLean
catastrophe. The CIA had also suffered several recent de-
feats at the hands of the KGB in Europe, and it was under-
standably reluctant to be duped again.
Penkovsky, however, was determined to spy for the West,
and in 1960 he made contact with British intelligence, which
eventually recruited him. The British informed the CIA of
Propaganda and Disinformation
155
Penkovsky's availability and offered to conduct the opera-
tion as a joint project. CIA operators in Moscow and else-
where participated in the elaborate clandestine techniques
used to receive information from Penkovsky and to debrief
the Soviet spy on his visits to Western Europe.
3 LINES DELETED
The Penkovsky Papers was a best-seller around the world,
and especially in the United States. Its publication certainly
caused discomfort in the Soviet Union.
9V2 LINES DELETED
Richard Melms years later again referred to Penkovsky in
this vein, although not by name, when he claimed in a speech
before the American Society of Newspaper Editors that "a
number of well-placed and courageous Russians . . . helped
us" in uncovering the Soviet move. One person taken in by
this deception was Senator Milton Young of North Dakota,
who serves on the CIA oversight subcommittee. In a 1971
Senate debate on cutting the intelligence budget, the Sena-
tor said, "And if you want to read something very interest-
ing and authoritative where intelligence is concerned, read
the Penkovsky papers . . . this is a very interesting story, on
why the intelligence we had in Cuba was so important to us,
and on what the Russians were thinking and just how far
they would go."
Yet the CIA intelligence analysts who were working on
the Cuban problem at the time of the missile crisis and
preparing the agency's intelligence reports for the President
up to and after the discovery of the Soviet missiles saw no
such information from Penkovsky or any other Soviet spy.
The key intelligence that led to the discovery of the missiles
came from the analysis of satellite photography of the
U.S.S.R., Soviet ship movements, U-2 photographs of Cuba,
and information supplied by Cuban refugees. Penkovsky's
technical background information, provided well before the
crisis, was of some use — but not of major or critical
importance.
Several scholars of the Soviet Union have independently
characterized The Penkovsky Papers as being partly bogus
and as not having come from Penkovsky's "journal." The
156
The CIA and the Cult of Intelligence
respected Soviet expert and columnist for the Manchester
Guardian and the Washington Post, Victor Zorza, wrote that
"the book could have been compiled only by the Central
Intelligence Agency." Zorza pointed out that Penkovsky
had neither the time nor the opportunity to have produced
such a manuscript; that the book's publisher (Doubleday
and Company) and translator (Peter Deriabin, himself a
KGB defector to the CIA) both refused to produce the
original Russian manuscript for inspection; and that The
Penkovsky Papers contained errors of style, technique, and
fact that Penkovsky would not have made.
British intelligence also was not above scoring a propa-
ganda victory of its own in the Penkovsky affair. Penkovsky's
contact officer had been MI-6's Greville Wynne, who, work-
ing under the cover of being a businessman, had been ar-
rested at the same time as Penkovsky and later exchanged
for the Soviet spy Gordon Lonsdale. When Wynne returned
to Britain, IVII-6 helped him write a booli about his expe-
riences, called Contact on Corky Street. British intelligence
wanted the book published in part to make some money for
Wynne, who had gone through the ordeal of a year and a
half in Soviet prisons, but the MI-6's main motive was to
counteract the extremely unfavorable publicity that had been
generated by the defection of its own senior officer, Harold
"Kim" Philby, in 1963, and the subsequent publication of his
memoirs prepared under the auspices of the KGB.
Interestingly, nowhere in Contact on Gorky Street does
Wynne cite the help he received from the CIA. The reason
for this omission could have been professional jealousy on
the part of British intelligence, good British manners (i.e.,
not mentioning the clandestine activities of a friendly intelli-
gence service), or most likely, an indication of the small role
played by the CIA in the operation.
Another book-publishing effort in which the CIA may or
may not have been involved — to some degree — was Khru-
shchev Remembers, and the second volume of Khrushchev
memoirs scheduled for publication this year. While these
autobiographical and somewhat self-serving works unques-
tionably originated with the former Soviet premier himself,
there are a number of curious circumstances connected with
their transmission from Moscow to Time Inc. in New York,
and to its book-publishing division. Little, Brown and
Company. Time Inc. has been less than forthcoming about
Propaganda and Disinformation
157
how it gained access to the 180 hours of taped reminiscences
upon which the books are based, and how the tapes were
taken out of the U.S.S.R. without the knowledge of the
Soviet government or the ubiquitous and proficient KGB.
The whole operation— especially its political implication — was
simply too important to have been permitted without at least
tacit approval by Soviet authorities. Unlike Alexander
Solzhenitsyn, Khrushchev was subsequently neither denounced
nor exiled by Moscow's all-powerful party chiefs.
Most of the explanations offered by Time Inc. to clarify
the various mysteries involved in this episode have a slightly
disingenuous air. They may be true, but a number of highly
regarded American and British scholars and intelligence offi-
cers dealing with Soviet affairs find them difficult to accept
in toto. Why, for example, did Time Inc. find it necessary to
take the risky step of sending a copy of the bound galleys of
the book to its Moscow bureau — secretly via Helsinki — before
it was published? The complete story of the Khrushchev
memoirs, in short, may never be publicly known. And if it
is, it may turn out to be another example of secret U.S.-
Soviet cooperation, of two hostile powers giving wide circu-
lation to information that each wants to see published, while
collaborating to keep their operations away from the eyes of
the general public on both sides. After all, the publication of
the first volume in 1971 had a relatively happy effect — it
supported Moscow's anti-Stalinists, and in turn increased the
prospect for detente.
7.
ESPIONAGE AND COUNTERESPIONAGE
The soul of the spy is somehow the model or us all.
— JACOUI-:S HARZUN
Intelligence agencies, in the popular view, are organizations
of glamorous master spies who, in the best tradition of
James Bond, daringly uncover the evil intentions of a nation's
enemies. In reality, however, the CIA has had compara-
tively little success in acquiring intelligence through secret
agents. This classical form of espionage has for many years
ranked considerably below space satellites, code-breaking,
and other forms of technical collection as a source of impor-
tant foreign information to the U.S. government. Even open
sources (the press and other communications media) and
official channels (diplomats, military attaches, and the like)
provide more valuable information than the Clandestine Ser-
vices of the CIA. Against its two principal targets, the Soviet
Union and Communist China, the effectiveness of CIA spies
is virtually nil. With their closed societies and powerful
internal-security organizations, the communist countries have
proved practically impenetrable to the CIA.
To be sure, the agency has pulled off an occasional espio-
nage coup, but these have generally involved "walk-ins"
— defectors who take the initiative in offering their services
to the agency. Remember that in 1955, when Oleg Penkovsky
first approached CIA operators in Ankara, Turkey, to dis-
cuss the possibility of becoming an agent, he was turned
away, because it was feared that he might be a double agent.
Several years later, he was recruited by bolder British intelli-
gence officers. Nearly all of the other Soviets and Chinese
who either spied for the CIA or defected to the West did so
without being actively recruited by America's leading espio-
nage agency.
Technically speaking, anyone who turns against his govern-
ment is a defector. A successfully recruited agent or a walk-in
who offers his services as a spy is known as a defector-in-
place. He has not yet physically deserted his country, but
Espionage and Counterespionage 159
has in fact defected politically in secret. Refugees and emigres
are also defectors, and the CIA often uses them as spies
when they can be persuaded to risk return to their native
lands. In general, a defector is a person who has recently
bolted his country and is simply willing to trade his knowl-
edge of his former government's activities for political asy-
lum in another nation; that some defections are accompanied
by a great deal of publicity is generally due to the CIA's
desire to obtain public approbation of its work.
Escapees from the U.S.S.R. and Eastern Europe are han-
dled by the CIA's defector reception center at Camp King
near Frankfurt, West Germany. There they are subjected to
extensive debriefing and interrogation by agency officers
who are experts at draining from them their full informa-
tional potential. Some defectors are subjected to questioning
that lasts for months; a few are interrogated for a year or
more.
A former CIA chief of station in Germany remembers
with great amusement his role in supervising the lengthy
debriefing of a Soviet lieutenant, a tank-platoon commander,
who fell in love with a Czech girl and fled with her to the
West after the Soviet invasion of Czechoslovakia in 1968. The
ex-agency senior officer relates how he had to play marriage
counselor when the couple's relationship started to sour,
causing the lieutenant to lose his willingness to talk. By
saving the romance, the chief of station succeeded in keep-
ing the information flowing from the Soviet lieutenant. Al-
though a comparatively low-level Soviet defector of this sort
would seem to have small potential for providing useful
intelligence, the CIA has had so little success in penetrating
the Soviet military that the lieutenant underwent months of
questioning. Through him, agency analysts were able to
learn much about how Soviet armor units, and the ground
forces in general, are organized, their training and tactical
procedures, and the mechanics of their participation in the
build-up that preceded the invasion of Czechoslovakia. This
was hardly intelligence of strategic importance, but the CIA's
Clandestine Services have no choice but to pump each low-
level Soviet defector for all he is worth.
The same former chief of station also recalls with pride
the defection of Yevgeny Runge, a KGB illegal (or "deep
cover" agent) in late 1967. Runge, like the more infamous
Colonel Rudolf Abel from Brooklyn and Gordon Lonsdale
160
The CIA and ihe Cull of Intelligence
of London, was a Soviet operator who lived for years under
an assumed identity in West Germany. Unlike his colleagues,
however, he was not exposed and arrested. Instead, Runge
defected to the CIA when he lost interest in his clandestine
work. According to the ex-agency official, Runge was of
greater intelligence value to the U.S. government than
Penkovsky. This assessment, however, is highly debatable
because Runge provided no information which the CIA's
intelligence analysts found to be useful in determining Soviet
strategic capabilities or intentions. On the other hand, the
KGB defector did reveal much concerning the methods and
techniques of Soviet clandestine intelligence operations in
Germany. To CIA operators who have been unsuccessful in
penetrating the Soviet government and who have conse-
quently become obsessed with the actions of the opposition,
the defection of an undercover operator like Runge repre-
sents a tremendous emotional windfall, and they are inclined
to publicize it as an intelligence coup.
Once the CIA is satisfied that a defector has told all that
he knows, the resettlement team takes over. The team's
objective is to find a place for the defector to live where he
will be free from the fear of reprisal and happy enough
neither to disclose his connections with the CIA nor, more
important, to be tempted to return to his native country.
Normally, the team works out a cover story for the defector,
invents a new identity for him, and gives him enough money
(often a lifetime pension) to make the transition to a new
way of life. The most important defectors are brought to the
United States (either before or after their debriefing), but
the large majority are permanently settled in Western Europe,
Canada, or Latin America.*
The defector's adjustment to his new country is often
quite difficult. For security reasons, he is usually cut off
from any contact with his native land and, therefore, from
his former friends and those members of his family who did
not accompany him into exile. He may not even know the
language of the country where he is living. Thus, a large
percentage of defectors become psychologically depressed
with their new lives once the initial excitement of resettle-
'On occasion, a defector will be hired as a contract employee to do specialized
work as a translator, interrogator, counterintelligence analyst, or Ihe like, for
the Cliindcstine Services.
Espionage and Counterespionage 161
ment wears off. A few have committed suicide. To try to
keep the defector content, the CIA assigns a case officer to
each one for as long as is thought necessary. The case officer
stays in regular contact with the defector and helps solve any
problems that may arise. With a particularly volatile defector,
the agency maintains even closer surveillance, including tele-
phone taps and mail intercepts, to guard against unwanted
developments.
In some instances, case officers will watch over the defec-
tor for the rest of his life. More than anything else, the
agency wants no defector to become so dissatisfied that he
will be tempted to return to his native country. Of course,
redefection usually results in a propaganda victory for the
opposition; of greater consequence, however, is the fact that
the defector probably will reveal everything he knows about
the CIA in order to ease his penalty for having defected in
the first place. Moreover, when a defector does return home,
the agency has to contend with the nagging fear that all
along it has been dealing with a double agent and that all the
intelligence he revealed was part of a plot to mislead the
CrA. The possibilities for deception in the defector game are
endless, and the communist intelligence services have not
failed to take advantage of them.
Bugs and Other Devices
Strictly speaking, classical espionage uses human beings to
gather information; technical espionage employs machines,
such as photographic satellites, long-range electronic sensors,
and communications-intercept stations. Technical collection
systems were virtually unknown before World War II, but
the same technological explosion which has affected nearly
every other aspect of modern life over the last twenty-five
years has also drastically changed the intelligence trade.
Since the war, the United States has poured tens of billions
of dollars into developing ever more advanced machines to
keep track of what other countries — especially communist
countries — are doing. Where once the agent sought secret
information with little support beyond his own wits, he now
is provided with a dazzling assortment of audio devices,
miniaturized cameras, and other exotic tools.
Within the CIA's Clandestine Services, the Technical Ser-
vices Division (TSD) is responsible for developing most of
162
The CIA and the Cull of Intelligence
the equipment used in the modern spying game. Some of the
paraphernalia is unusual: a signal transmitter disguised as a
false tooth, a pencil which looks and writes like an ordinary
pencil but can also write invisibly on special paper, a bizarre
automobile rear-view mirror that allows the driver to observe
not the traffic behind but the occupants of the back seat
instead. Except for audio communications systems, there is
in fact little applicnbility for even the most imaginative tools
in real clandestine operations.
Secret intelligence services in past times were interested
only in recruiting agents who had direct access to vital for-
eign information. Today the CIA and other services also
search for the guard or janitor who is in a position to install
a bug or a phone tap in a sensitive location. Even the
telephone and telegraph companies of other countries have
become targets for the agency. In addition to the foreign and
defense ministries, the CIA operators usually try to pene-
trate the target nation's communications systems — a task
which is on occasion aided by American companies, particu-
larly the International Telephone and Telegraph Company.
Postal services also are subverted for espionage purposes.
Most agency operators receive training in the installation
and servicing of bugs and taps, but the actual planting of
audio surveillance devices is usually carried out by TSD
specialists brought in from headquarters or a regional
operational support center, like ( DELETED ).
The more complex the task, the more likely it is that the
headquarters specialists will be utilized to do the job. On
some operations, however, agents will be specially trained
by TSD experts, or even the responsible case officer, in the
skills of installing such equipment.
Audio operations vary, of course, in complexity and
sensitivity — that is, in risk potential. A classic, highly danger-
ous operation calls for a great deal of planning, during which
the site is surveyed in extensive detail. Building and floor
plans must be acquired or developed from visual surveillance.
The texture of the walls, the colors of interior paints, and
the like must be determined. Activity in the building and in
the room or office where the device is to be installed must
be observed and recorded to ascertain when the area is
accessible. The movements of the occupants and any secu-
rity patrols must be also known. When all this has been
accomplished, the decision is made as to where and when to
Espionage and Counterespionage 163
plant the bug. Usually, the site will be entered at night or on
a weekend and. in accordance with carefully pre-planned
and tightly timed actions, the audio device will be installed.
High-speed, silent drills may be used to cut into the wall,
and after installation of the bug. the damage will be repaired
with quick-drying plaster and covered by a paint exactly
matching the original. The installation may also be accom-
plished from an adjoining room, or one above or below (if a
ceiling or floor placement is called for).
The agency's successes with bugs and taps have usually
been limited to the non-communist countries, where rela-
tively lax internal-security systems do not deny the CIA
operations the freedom of movement necessary to install
eavesdropping devices. A report on clandestine activities in
Latin America during the 1960s by the CIA Inspector General,
for example, revealed that a good part of the intelligence
collected by the agency in that region came from audio
devices. In quite a few of the Latin nations, the report
noted, the CIA was regularly intercepting the telephone
conversations of important ofTicials and had managed to
place bugs in the homes and oflices of many key personnel,
up to and including cabinet minislen. In some allied coun-
tnes the agency shares in the information acquired from
audio surveillance conducted by the host intelligence service,
which often receives technical assistance from the CIA for
this very purpose — and may be penetrated by the CIA in the
process.
Audio devices are fickle. As often as not, they fail to work
after they have been installed, or they function well for a
few days, then suddenly fall silent. Sometimes they are quickly
discovered by the local security services, or, suspecting that
a room may be bugged, the opposition employs effective
countermeasures. The Soviet KGB has the habit of renting
homes and offices in foreign countries and then building new
interior walls, floors, and ceilings covering the original ones
in key rooms — thus completely baffling the effectiveness of
any bugs that may have been installed. The simplest way to
negate audio surveillance — and it is a method universally
employed — is to raise the noise level in the room by con-
stantly playing a radio or a hi-fi set. The music and other
extraneous noises tend to mask the sounds of the voices that
the bug is intended to capture; unlike the human ear, audio
devices cannot distinguish among sounds.
164
The CIA and the Cult of Intelligence
CIA technicians are constantly working on new listening
devices in the hope of improving the agency's ability to
eavesdrop. Ordinary audio equipment, along with other clan-
destine devices, are developed by the Technical Services
Division. In addition to espionage tools, the TSD devises
gadgets for use in other covert activities, such as paramilitary
operations. Plastic explosives, incapacitating and lethal drugs,
and silent weapons — high-powered crossbows, for example —
are designed and fabricated for special operations. The more
complex or sophisticated instruments used by the CIA's
secret operators are, however, produced by the agency's
Directorate of Science and Technology. This component
also assists other groups within the CIA engaging in clandes-
tine research and development. It aids the Office of Security
in the tatter's effort to improve on the polygraph (lie detector)
machine through research on eye movement and changes in
voice quality under stress, and by the use of drugs. Experi-
ments with drugs for this purpose have been secretly con-
ducted by outside scientists under contract to the CIA, some
apparently connected with universities, on volunteers from a
few federal penitentiaries. The D/S & T, furthermore, assists
the Oflice of Communications in devising new and improved
methods of communications intercept and security counter-
measures.
Although the experts in the Science and Technology Direc-
torate have done much outstanding work in some areas — for
example, overhead reconnaissance — their performance in the
audio field for clandestine application is often less than
satisfactory. One such device long under development was a
laser beam which could be aimed at a closed window from
outside and used to pick up the vibrations of the sound
waves caused by a conversation inside the room. This system
was successfully tested in the field — in West Africa — but it
never seemed to function properly elsewhere, except in the
United States. Another device was . . . Under laboratory
conditions and controlled field experiments, the system per-
formed adequately, but the many imponderables of real opera-
tional situations . . . prevented . . . from ever being used by
the Agency's clandestine operators.
When CIA operators are successful in planting a bug or
making a tap, they send the information thus acquired back
to the Clandestine Services at headquarters in Langley with
the source clearly identified. However, when the Clandes-
Espionage and Counterespionage 165
tine Services, in lurn, pass the information on to the intelli-
gence analysts in the agency and elsewhere in the federal
government, the source is disguised or the information is
buried in a report from a real agent. For example, the
Clandestine Services might credit the information to ''a source
in the foreign ministry who has reported reliably in the past"
or "a Western businessman with wide contacts in the local
government." In the minds of the covert operators, it is
more important to protect the source than to present the
information straightforwardly. TTiis may guarantee "safe"
sources, but it also handicaps the analysts in a confident
judgment of the accuracy of the report's content.*
87 LINES DELETED
The fertile imaginations of the S&T Directorate experts
during the following years produced many more unique col-
lection schemes aimed at solving the mysteries of China's
strategic missile program. Most eventually proved to be
unworkable, and at least one entailed a frighteningly high
risk potential. The silliest of all, however, called for the
creation of a small one-man airplane that could theoretically
be packaged in two large suitcases. In concept, an agent
along with the suitcases would somehow be infiltrated into
the denied area, where, after performing his espionage
mission, he would assemble the aircraft and (ly to safety
over the nearest friendly border. Even the chief of the
Clandestine Services refused to have anything to do with this
scheme, and the project died on the drawing boards.
33 LINES DELETED
The technical difficulties involved in the (DELETED)
system and the (DELETED) device were too great and
too time-consuming for either to be fully developed by their
'This withholding of information within the government for security reasons
is not a new phenomenon in the intelhgencc business. The joint congressional
committee investigating the Japanese attack on Pearl Harbor found thai "the
fact the Japanese codes had been broken was regarded as of more importance
than the information obtained from decoded traffic. The result of this rather
specious premise was to leave large numbers of policy-making and enforce-
ment officials in Washington completely oblivious of the most pertinent infor-
mation concerning Japan."
166
The CIA and the Cult of Intelligence
inventors before improvements in intelligence-satellite sur-
veillance programs were achieved. Other clandestine collec-
tion devices — a few more sensibly contrived, but most of
dubious value — were also developed by the agency's techni-
cians and may now be in operation. The CIA's technical
experts often feel compelled to build exotic systems only
because of the mechanical challenge they pose. Such efforts
might be justified by an intelligence requirement; unfor-
tunately, too many intelligence requirements are not hon-
estly based on the needs of the policy-makers but are instead
generated by and for the CIA and the other intelligence-
community members alone.
The Technical Collection Explosion
While technology has increasingly tended to mechanize clas-
sical espionage, its most important impact on the intelligence
trade has been in large-scale collection — satellites, long-range
sensors, and the interception of communications. These tech-
nical espionage systems have become far and away the most
important sources ot information on America's principal
adversaries. Overhead-reconnaissance programs have provided
much detailed information on Soviet and Chinese missile
programs, troop movements, and other military develop-
ments. They have also produced valuable information re-
garding North Vietnamese infiltration of South Vietnam and
North Korean military preparations against South Korea.
And such collection has frequently contributed to the U.S.
government's knowledge of events in the Middle East.
As technical collection becomes more refined, classical
spies have, of course, become nearly obsolete in clandestine
operations against the more important target countries. So,
too, has the shift to technical espionage caused America's
intelligence costs to skyrocket to more than S6 billion yearly.
Not only are classical spies relatively cheap, but technical
collection systems, producing incredible amounts of infor-
mation, require huge numbers of people to process and
analyze this mass of raw data.
In terms of money spent and personnel involved, the CIA
is very much a junior partner to the Pentagon in the technical-
espionage field. The Defense Department has an overall
intelligence budget of about SS billion a year, some 75 to 80
percent of which is spent on technical collection and
Espionage and Counterespionage 167
processing. The CIA's technical programs, however, amount
to no more than SISO million yearly. (This is exclusive of
several hundred million in funds annually supplied by the
Pentagon for certain community-wide programs, such as sat-
ellite development, in which the agency shares.) Similarly,
there are lens of thousands of people — both military and
civilian — working for the Defense Department in the techni-
cal fields, whereas the CIA only has about 1,500 such
personnel.
Still, the agency has made a substantial contribution to
research and development in technical espionage. Over the
years, CIA scientists have scored major successes by develop-
ing the U-2 and SR-71 spy planes, in perfecting the first
workable photographic-reconnaissance satellites, and in pro-
ducing outstanding advances in stand-off, or long-range, elec-
tronic sensors, such as over-the-horizon radars and stationary
satellites. A good part of these research and operating costs
have been funded by the Pentagon, and in several instances
the programs were ultimately converted into joint CIA-
Pentagon operations or "captured" by the military services.
America's first experience in technical espionage c:ime in the
form of radio intercepts and code-breaking, an art known as
communications intelligence (COM INT). Although Secre-
tary of State Henry Stimson closed down the cryptanalytical
section of the State Department in 1929 with the explanation
that "gentlemen do not read each other's mail," COMINT
was revived, and played an important part in U.S. intelli-
gence activities during World War II. In the immediate
postwar period this activity was initially reduced, then ex-
panded once again as the Cold War intensified. In 1952 the
President, by secret executive order, established the Na-
tional Security Agency (NSA) to intercept and decipher the
communications of both the nation's enemies and friends
and to ensure the U.S. codes were secure from similar
eavesdropping. The NSA, though placed under the control
of the Defense Department, soon established an indepen-
dent bureaucratic identity of its own — and at present has a
huge budget of well over a billion dollars per annum and a
workforce of some 25,000 personnel.
Before the NSA can break into and read foreign codes and
ciphers, it must first intercept the encoded and encrypted
messages of the target country. To make these intercepts, it
168
The CIA and the Cult of Intelligence
must have listening posts in locations where the signal waves
of the transmitters that send the messages can be acquired.
Radio traffic between foreign capitals and embassies in Wash-
ington can be easily picked off by listening equipment lo-
cated in suburban MaryUnd and Virginia, but communications
elsewhere in the world are not so easily intercepted. Thus,
the NSA supports hundreds of listening posts around the
globe, such posts usually being operated by other U.S. gov-
ernment agencies. Most commonly used to run the NSA's
overseas facilities are the armed services' cryptological
agencies: the Army Security Agency, the Navy Security
Service, and the Air Force Security Agency. These three
military organizations come under the NSA's policy coordi-
nation; the messages they intercept are sent back to NSA
headquarters at Fort Meade, Maryland, near Washington.
Perhaps the most controversial NSA base (operated by the
Army) is at Kagnew in Ethiopia. A Senate subcommittee
investigating American commitments abroad, chaired by Stuart
Symington, revealed in 1970 that this heretofore secret facil-
ity had been secured from the Haile Selassie regime in
return for hundreds of millions of dollars in military and
economic assistance — without most members of Congress
ever being aware of its existence. The Symington subcommit-
tee also discovered a similar NSA facility (operated by the
Navy) at (DELETED) in (DELETED) which also has been
kept secret from Congress. Both these bases have been used
to intercept communications from the Middle East and Africa,
and both required the U.S. government to offer an implicit —
but secret — commitment to the host government.
IS LINES DELETED
Although the NSA engineered some successes against the
Eastern European countries and Communist China in its
early days, for at least the last fifteen years it has been
completely unable to break into the high-grade cipher sys-
tems and codes of these nations. Against such major targets,
the NSA has been reduced to reading comparatively unim-
portant communications between low-level military components
and the equally inconsequential routine exchanges between
low-grade bureaucrats and economic planners. This is far
short of learning the Soviet Union's or China's most vital
secrets.
Espionage and Counterespionage 169
7>/i LINES DELETED
. . .*One such benefit is derived from traffic analysis, the
technique by which the NSA gleans some useful information
through the study of communication patterns. A principal
assistant of the NSA Director observed at the same meeting
that another justification for the agency's continuing pro-
grams against the Soviets and Chinese is the hope that
"maybe we'll get a break sometime, like the Pueblo." He
was, of course, referring to the capture in 1968 of the NSA
spy ship by North Korea. Much of the Pueblo's cryptological
machinery was seized intact by the North Koreans and proba-
bly turned over to the Soviets. While these machines were
not associated with the highest-grade U.S. military or diplo-
matic systems, the Soviets would have been able to use them
to read messages previously sent through certain American
military channels and intercepted and stored by the Soviets.
The NSA has for many years been recording and storing
not-yet "broken" Soviet and Chinese messages, and can
presume the same has been done with American communi-
cations; for our part, there are literally boxcars and ware-
houses full of incomprehensible tapes of this sort at NSA's
Fort Meade headquarters.
As with so many other parts of the American intelligence
apparatus, the NSA has had considerably more success oper-
ating against the Third World countries and even against
some of our allies. With what is reportedly the largest bank
of computers in the world and thousands of cryptanalysts, the
NSA has had little trouble with the codes and ciphers of
these nations. Two of the highly secret agency's young officers,
'David Kahn, author of the definitive woric on modern cryptology. The Code
Breakers, explained in the June 22, 1973, New York Times why NSA has had
and will continue to have so little luck with reading advanced communications
systems like the Soviets': "Cryptology has advanced, in the last decade or so,
to systems that, though not unbreakable in the absolute, are unbreakable in
practice. They consist essentially of mathematical programs for computer-like
cipher machines. They engender so many possibilities that, even given tor-
rents of intercepts, and scores of computers to batter them with, cryptanalysts
could not reach a solution for thousands of years. Moreover, the formulas are
so constructed that even if the cryptanalyst has the ideal situation — the original
plain text of one of the foreign cryptograms — he cannot recreate the formula
by comparing the two and then use it to crack the next message that comes
along."
170
The CIA and ihe Cull of Intelligence
William Manin and Bernon Mitchell, who defected to the
Soviei Union in 1960, mentioned thirty to forty nations whose
systems the NSA could read. In addition, Martin and Mitch-
ell told of a practice under which the NSA provided encod -
ing and cryptographic machines to otTier nations, then used
ff s T n owl edgg'oi lTlK rnachiri'er~tb r'e~d t h e Tnt e'r'c' epB! U 'I H<!'s -
szgt^ orrrese7cu?riTrre< rTmrTfrjPtTgg miT'T^i'TOffg jr'""
One oftTie counlrTes thai Martin and Mitchell specifically
named as being read hy the NSA at that time w;is Egypt —
the United Arab Republic. After making their revelation at
a Moscow press conference,
18 LINES DELETED
The Soviets probably were, too.
HVi LINES DELETED
A "break," in the terminology of the cryptanalyst, is a
success scored not through deciphering skill, but because of
an error on the part of another country's communications
clerks or, on rare occasions, a failure in the cipher equipment.
A few years ago. a new code clerk arrived at a foreign
embassy in Washington and promptly sent a message "in the
clear" (i.e., unenciphered), to his Foreign Ministry. Realiz-
ing that he should have encrypted the transmission, he sent
the same message again, but this time in cipher. With the
"before and after" messages in hand, the NSA had little
difficulty thereafter, of course, reading that country's secret
communications. Malfunctioning or worn-out cryptographic
equipment results in triumphs for the NSA by unintention-
ally establishing repetitious patterns which detract from the
random selections that are vital to sophisticated ciphers. A
rough analogy would be a roulette wheel which, because of
poor construction or excessive wear, develops certain predict-
able characteristics discernible to a keen observer who is '
then able to take advantage because of his special knowledge. I
Another type of break comes as a result of a physical |
(rather than cerebral) attack on another country's communi- i
cations system. The attack may be a clandestine operation to 1
steal a code book or cipher system, the suborning of a I
communications clerk, or the planting of an audio device in I
an embassy radio room. Within the CIA's Clandestine 1
Espionage and Counterespionage 171
Services, a special unit of the Foreign Intelligence (i.e.,
espionage) Staff specializes in these attacks.* When it is
successful, the information it acquires is sent to the NSA to
help that agency with its COMINT efforts.
In 1970, NSA Director Admiral Noel Gayler and his top
deputies admitted privately that a good part of the NSA's
successes came from breaks, and they emphasized that the
agency was extremely adept at exploiting these non-crypt-
analytical windfalls. Nevertheless, breaks are never men-
tioned in the authorized U.S. government "leaks" concerning
the NSA's activities that from time to time appear in the
press. In its controlled revelations to the public, the NSA
deliberately tries to create the impression that it is incredibly
good at the art of deciphering secret foreign communications
and that its triumphs are based purely on its technical skills.
23 LINES DELETED
A side effect of the NSA's programs to intercept diplomatic
and commercial messages is that rather frequently certain
information is acquired about American citizens, including
members of Congress and other federal officials, which can
be highly embarrassing to those individuals. This type of
intercepted message is handled with even greater care than
the NSA's normal product, which itself is so highly classified
that a special security clearance is needed to see it. Such
information may, for example, derive from a Senator's con-
versation with a foreign ambassador in Washington who
then cables a report of the talk to his Foreign Ministry.
A more serious embarrassment happened in 1970 during
*This approach apparently appealed to President Nixon when he approved
the 1970 Huston plan for domestic espionage which surfaced during the
Watergate scandal. The plan called for breaking into foreign embassies in
Washington because it would be "possible by this technique to secure the
material with which the NSA can crack foreign cryptographic codes. We spend
millions of dollars attempting to break these codes by machines. One surrepti-
tious entry can do the job successfully at no dollar cost." While the Huston
plan might have been effective against Third World countries with unsophisti-
cated cryptological systems, it was unlikely to score any significant gains
against major powers — even if there had been any successful break-ins. David
Kahn explains why: "Code-books could be photographed, |because| today's
cipher secrets reside in electronic circuits, same of them integrated on a
pinhead. some of them embodied in printed-circuit boards with up lo fifteen
layers."
172
The CIA and the Cult of Intelligence
the course of delicate peace talks on the Middle East. A
State Department official had a conversation about the nego-
tiations with an Arab diplomat who promptly reported what
he had been told to his government. His cable disclosed that
the State Department man had either grossly misstated the
American bargaining poslllon or the diplomat had badly
misunderstood what had been told him. In any case, high
State Department officers were quite disturbed about the
misrepresented position and the incident did not reflect well
on the competence of the American official in the eyes of his
superiors.
Not even the CIA is immune to such prying by the NSA.
On one occasion the Director of Central Intelligence was
supplied with an intercepted message concerning his deputy.
According to this message, a transmission from a Western
European ambassador to his Foreign Office, the CIA's
number-two man had a few evenings earlier at a dinner
party hosted by the ambassador indiscreetly opined on sev-
eral sensitive LI.S. policy positions. The ambassador's inter-
pretation of the con>'ersation was contradicted by the Deputy
Director — to the apparent satisfaction of the DCI — and the
matter was quietly dropped.
Some NSA-intercepted communications can cause surpris-
ing problems within the U.S. government if they are inadver-
tently distributed to the wrong parties. When particularly
sensitive foreign-policy negotiations are under way which
may be compromised internally by too much bureaucratic
awareness, the White House's usual policy has been to issue
special instructions to the NSA to distribute messages men-
tioning these negotiations only to Henry Kissinger and his
immediate staff.
The FBI operates a wiretap program against numerous for-
eign embassies in Washington which, like some of the NSA
intercept operations, also provides information about Ameri-
cans, in cooperation with the Chesapeake and Potomac
Telephone Company (a Bell subsidiary), FBI agents regu-
larly monitor the phones in the offices of all communist
governments represented here; on occasion, the embassies
of various non-communist countries have their phones tapped,
especially when their nations are engaged in negotiations
with the U.S. government or when important developments
are taking place in these countries.
Espionage and Counterespionage 173
nVi LINES DELETED
Wiretaps on foreign embassies, justified on the grounds of
preserving national security, must be approved by the State
Department before they are installed by the FBI. As it is
often State which requests the FBI to activate the listening
devices, approval is almost always given. The transcripts of
such conversations are never marked as having come from
wiretaps, but instead carry the description "from a source
who has reported reliably in the past." Such reliable "sources"
include State Department officials themselves — the CIA has,
on occasion, intercepted communications between American
ambassadorial officials and their colleagues in Washington.
In the way of background, il should be understood that
CIA communications clerks handle nearly all classified ca-
bles between American embassies and Washington — for both
the CIA and the Stnte Department. To have a separate code
room for each agency in every embassy would be a wasteful
procedure, so a senior CIA communications expert is regu-
larly assigned to the administrative part oi the State Depart-
ment in order to oversee the CIA's communicators who
work under State cover. In theory, CIA clerks are not sup-
posed to read the messages they process for State, but any
code clerk who wants to have a successful career quickly
realizes that his promotions depend on the CIA and that he
is well advised to show the CIA station chief copies of all
important State messages. The State Department long ago
implicitly recognized that its most secret cables are not se-
cure from CIA inspection by setting up special communica-
tions channels which supposedly cannot be deciphered by
the CIA.
When in 1968 Ambassador to Iran Armin Meyer ran into
troubles with the CIA station chief in Teheran, Meyer
switched his communications with State in Washington to
one of these "secure" channels, called "Roger." But the
CIA had nonetheless figured out a way to intercept his
cables and the replies he received from Washington; the
CIA Director thus received a copy of each intercepted
cable. Written on lop of each cable was a warning that
the contents of the cable should be kept especially con-
fidential because State was unaware that the CIA had
a copy.
174
The CIA and the Cult of Intelligence
Satellites and Other Systems
The most important source of technical intelligence gathered
by the U.S. is that collected by photographic and electronic
reconnaissance satellites. Most are launched into north-south
orbits designed to carry them over such targets as the U.S.S.R.
and China with maximum frequency as they circle around
the earth. Others are put into orbits synchronized with the
rotation of the globe, giving the illusion that they are
stationary. Ail satellite programs come under the opera-
tional authority of the National Reconnaismnce Office (NRO),
a component of the Secretary of the Air Force's office. The
NRO spends well over a billion dollars every year for satel-
lites and other reconnaissance systems. While the Defense
Department provides all the money, policy decisions on how
the funds will be allocated are made by the Executive Com-
mittee for Reconnaissance, consisting of the Assistant Secre-
tary of Defense for Intelligence, the Director of Central
Intelligence, and the Assistant to the President for National
Security Affairs. Requirements for satellite collection are
developed by the U.S. Intelligence Board (USIB), which is
chaired by the Director of Central Intelligence and whose
members are the heads of all other intelligence agencies.
A special committee of the USIB designates the specific
targets each satellite will cover.
Employing high-resolution and wide-angle cameras, the
photographic satellites have for years provided voluminou'
and detailed information on Soviet and Chinese military
developments and other matters of strategic importance;
conversely, except for special cases such as the Arab-Israeli
situation, there has been little reason to apply satellite recon-
naissance against other, less powerful countries.
Some photographic satellites are equipped with color cam-
eras for special missions, and some even carry infrared sens-
ing devices which measure heat emissions from ground targets,
to determine, for example, if a site b occupied or what the level
of activity is at certain locations. There are satellites that have
television cameras to speed up the delivery of their product
to the photo interpreters who analyie, or read out, the film
packages of the spies in the sky. But, good as they are, photo
graphic satellites have inherent limitations. They cannot see
through clouds, nor can they see into buildings or inside objects.
Espionage and Counterespionage 175
In addition to photographic satellites, U.S. intelligence
possesses a wide array of other reconnaissance satellites which
perform numerous electronic sensing tasks. These satellites
collect data on missile testing, on radars and the emissions of
other high-power electronic equipment, and on communica-
tions traffic. Electronic satellites are in some cases supported
by elaborate ground stations, both in friendly foreign coun-
tries and in the United States, that feed targeting directions
to the sensors, receive the collected data from the satellites,
and transmit the processed data to the intelligence agencies
in Washington. (The electronic satellite systems to a large
extent carry out the same collection functions performed by
the many listening posts of the CIA and NSA which ring the
U.S.S.R. and China. And they collect much of the same data
as that gathered by the NSA 's spy ships and the Air Force's
flying listening posts.
The JRC, Joint Reconnaissance Committee, an inter-agency
group controlled largely by the military through the Joint
Chiefs of Staff, maintains overall responsibility for the techni-
cal collection projects carried out by planes and ships.
Until satellites became operational in the early 1960s, spy
planes and ships were valuable sources of information, serv-
ing as supplements to the product of the NSA, then the best
material available to U.S. intelligence. Air Force and CIA
aircraft frequently flew along the perimeters of the commu-
nist countries and even over their territory in search of badly
needed electronic and photographic information. Spy ships
operated by the Navy — like the Pueblo — sailed along the
coasts listening in on communications and other electronic
signals. Although these programs were considered to be
great successes by the intelligence community, occasional
blunders such as the 19S9 U-2 affair and the Tonkin Gulf
incident in 1964 (the two U.S. destroyers "torpedoed" by
North Vietnamese boats were on a clandestine spy mission)
had a serious and detrimental effect on world politics. Ag-
gressive technical Intelligence-collection efforts have also led
to the capture of the Pueblo, the Israeli attack on the Liberty
in 1967, and shoot-downs of RB-47s by the Soviets and of
EC-121S and several U-2s by the Chinese.
Despite the risks incurred by such provocative collection
actions in the name of intelligence, the Pentagon continues
to sponsor these now obsolete programs. Satellites and long-
range stand-off (i.e., non-penetrating) systems have deeply
176
The CIA and the Cull of Inielligence
reduced, if not eliminated, the need for spy flights and
cruises. But the armed services have spent billions of dollars
to develop the spy planes and ships (just as the CIA and the
NSA have invested in outmoded listening posts ringing the
U.S.S.R. and China); consequently, there has been a stub-
born bureaucratic reluctance to take these collectors out of
service. The "drone" — pilotless aircraft — flights over China,
for example, were continued even after the Chinese started
shooting them down on a regular and embarrassing basis,
and after they had proven nearly useless. State Department
reconnaissance intelligence experts insisted that the Air Force
maintained the drone activity, even though the information
thus gathered was of marginal value, because it had nowhere
else to use such spy equipment. Similarly, Air Force SR-71s
have continued to fly over North Korea despite that country's
lack of meaningful intelligence targets. With the Soviet Union
declared off bounds for secret overflights since 1960, and
China since 1971, the Air Force can devise no other way of
justifying the operational need for these aircraft.
20 LINES DELETED
Clearly, the prevailing theology in the U.S. intelligence
community calls for the collection of as much information as
possible. Little careful consideration is given to the utility of
the huge amounts of material so acquired. The attitude of
"collection for collection's sake" has resulted in mountains
of information which can only overwhelm intelligence ana-
lysts charged with interpreting it. Further, such material
contributes little to the national requirements, though it may
prove interesting to certain highly specialized analysts, partic-
ularly in the Pentagon. There has been little coordination
between the managers of the various technical espionage
programs, and even less between the collectors and the
policy-makers. Each of the many agencies which carry out
such programs has a vested bureaucratic interest in keeping
its particular system in being, and the extreme compartmen-
talization of the operations has made it almost impossible for
the programs to be evaluated as a whole. Former CIA
Director Helms failed almost completely in his assigned mis-
sion of bringing a more rational and coordinated approach
to the myriad technical espionage systems. It is not likely
Espionage and Counterespionage 177
that his successors will do much better. No CIA Director has
ever been able to manage the intelligence community.
Despite the roughly SS billion already being spent each
year on technical systems and on processing the great amounts
of data collected, there remains significant pressure within
the intelligence community to collect still more information.
The Pentagon has for several years been pushing for . . .)
This system is technologically feasible if the United States is
willing to invest . . . for the equipment . . . While the Con-
gress is permitted to pass on weapons systems of this magnitude,
. . . will probably never be voted on by our nation 's legisla-
tors because of the secrecy insisted upon by the intelligence
community. This secrecy is unquestionably needed to protect
the actual workings of the system, but then the operation of
the ABM was no less classified, and the national security did
not seem to be injured by the ABM debate in Congress. How-
ever, the very word "intelligence" seems to make our legis-
lators bow and genuflect. They have in the past bestowed
virtual blank checks on the various intelligence agencies,
allowing these organizations to do practically anything they
desired. The Soviets have a fairly clear idea of the functions
performed by American satellites and other collection systems;
there would seem to be little practical reason why the Congress
and the American people must be kept completely in the dark.
Furthermore, technical espionage of any kind has a limited
value. It can identify and measure missile development and
troop movements, but it cannot tell what foreign leaders are
planning to do with those missiles and troops. In 1968 the U.S.
intelligence community had a relatively clear picture of the
Soviet preparations for military action against Czechoslovakia;
it had no means whatever of knowing whether or not an actual
attack would be made. That kind of information could have
been provided only by a human spy inside the Kremlin, and
the CIA had none of those, and small prospect for recruiting
any. The United States knew what could happen, but intel-
ligence consumers have an insatiable appetite for knowledge
of what will happen. Their clamoring makes for more and
bigger collection systems to attempt to satisfy their demands.
Coun lerespionage
Counterespionage, the clandestine warfare waged between
rival intelligence agencies, is usually referred to more deli-
178
The CIA and the Cull of Intelligence
cately in the spy business as counterintelligence. Essentially
it consists of preventing the opposition from penetrating your
own secret service while at the same time working to pene-
trate the opposition's — to learn what he is planning against
you. As practiced by the CIA and the Soviet KGB. counter-
espionage is a highly complex and devious activity. It de-
pends on cunning entrapments. agents provocateurs, spies
and counterspies, double and triple crosses. It is the stuff
that spy novels are made of, with limitless possibilities for
deception and turns of plot.
While foreign intelligence organizations with longer histories
have traditionally emphasized counterespionage, U.S. intelli-
gence was slow to develop such a capability. To Americans
during World War II and immediately thereafter, counteres-
pionage meant little more than defensive security measures
such as electrified fences, watchdogs, and codes. The ob-
scure subtleties and intricate conspiracies of counterespio-
nage seemed alien to the American character and more
suited to European back alleys and the Orient Express. But
the demands of the Cold War and the successes scored by
the KGB in infiltrating Western intelligence services grad-
ually drew the CIA deeply into the counterespionage game.
Primary responsibility for U.S. internal security rests with
the FBI, but inevitably there has been friction between the
agency and the bureau in their often overlapping attempts to
protect the nation against foreign spies. In theory, the CIA
cooperates with the FBI in counterespionage cases by han-
dling the overseas aspects and letting the bureau take care of
all the action within the United States. In actual fact, the
agency tends to keep within its own control, even domestically,
those operations which are designed to penetrate opposition
intelligence services; the basically defensive task of prevent-
ing the Soviets from recruiting American agents in the United
States is left to the FBI. While the FBI also on occasion goes
on the offensive by trying to recruit foreign intelligence
agents, the bureau's first inclination seems to be to arrest or
deport foreign spies rather than to turn them, as the CIA
tries to do, into double agents. This fundamental difference
in approach limits the degree of FBI-CIA cooperation in
counterespionage and confirms the general view within the
agency that FBI agents are rather unimaginative police-officer
types, and thus incapable of mastering the intricacies of
counterespionage work. (The FBI, on the other hand, tends
Espionage and Counterespionage 179
to see CIA counterintelligence operators as dilettantes who
are too clever for their own good.) Although the CIA has
had almost no success in penetrating the Soviet and other
opposition services, it nonetheless continues to press for
additional operational opportunities in the United States,
claiming that the FBI is not sophisticated enough to cope
with the KGB.
Within the CIA, the routine functions of security — physical
protection of buildings, background investigations of person-
nel, lie-detector tests — are assigned to the Office of Security,
a component of the housekeeping part of the agency, the
M&S Directorate. Counterespionage policy and some actual
operations emanate from the Counterintelligence (CI) Staff
of the Clandestine Services. As with the bulk of espionage
activities, however, most operations are carried out by the
area divisions (Far East, Western Hemisphere, etc.). which
are also responsible. The area divisions tend to see espio-
nage value or information-gathering value in counterespio-
nage operations, which are referred to in CIA files as joint
FI/CI projects — FI (Foreign Intelligence) being the Clandes-
tine Services' euphemism for espionage.
Almost every CIA station or base overseas has one or
more officers assigned to it for counterespionage purposes.
The first priority for these counterspy specialists is to moni-
tor agency espionage and covert-action operations to make
sure that the opposition has not penetrated or in some other
way compromised the activity. All reports submitted by CIA
case officers and their foreign agents are carefully studied
for any indication of enemy involvement. The counterintelli-
gence men know all too well that agents, wittingly or
unwittingly, can be used by the KGB as deceptions to feed
false information to the CIA, or employed as provocations
to disrupt carefully laid operational plans. Foreign agents
can also be penetrations, or double agents, whose task it is to
spy on the CIA's secret activities. When a double agent is
discovered in an operation, consideration is given to "turning"
him — that is, making him a triple agent. Or perhaps he can
be unwittingly used to deceive or provoke the opposition.
If a KGB officer tries to recruit a CIA staff employee, the
counterespionage experts may work out a plan to entrap the
enemy operator, then publicly expose him or attempt to
"turn" him. Or they may encourage the agency employee to
pretend to cooperate with the Soviets in order to learn more
180
The CIA and the Cull of Intelligence
about what kind of information the KGB wants to collect, to
discover more about KGB methods and equipment, or merely
to occupy the time and money of the KGB on a fruitless
project. The CIA counterespionage specialists do not neces-
sarily wait for the KGB to make a recruitment effort, but
instead may set up an elaborate trap, dangling one of their
own as bait for the opposition.
Further, beyond safeguarding the CIA's own covert
operations, counterespionage officers actively try to pene-
trate the opposition services. Seeking to recruit agents in
communist and other intelligence services, they hope both to
find out what secret actions the opposition is planning to
take against the CIA, and to thwart or deflect those initiatives.
Counterespionage, like covert action, has become a career
speciality in the CIA; some clandestine operators do no
other type of work during their years with the agency. These
specialists have developed their own clannish subculture
within the Clandestine Services, and even other CIA opera-
tors often find them excessively secretive and deceptive. The
function o f t he t:o unle:n:s£io^nane off icers is to questitin and
verity ever^ asp ect u?XTA q peralKHis; la l(?ng ntilhine at fac e
value, they ten'J^ se e dcc cn ever v wRer I n an agency full
of exireme1y~mis't?ijsl'fu [ people, "i ti ey are the" profe ssional
"MMytxperienced CIA operators believe that counterespio-
nage operations directed against opposition services receive
a disproportionate amount of attention and resources within
the Clandestine Services, for even if a spy were recruited in
the KGB (which almost never happens), he would likely be
of less intelligence value than a penetration at a similar level
elsewhere in the Soviet government or Communist Party. To
be sure, the spy could probably provide the CIA with some
information on foreign agents working for the KGB, per-
haps the type of intelligence re eived from them and other
"ll is commonly thought within the CIA that the Counterintelligence Staff
operates on the assumption that the agency — as well as other elements of the
U.S. government — is penetrated by the KGB. The chief of the CI Staff is said
10 keep a list of the fifty or so key positions in the CIA which are most likely
10 have been infillraled by the opposition, and he reportedly keeps the
penons in those positions under constant surveillance. Some CIA officers
speculate — and a few firmly believe — that the only way to explain the poor
performance in recruiting Soviet agents — and conducting classical intelligence
operations in general against the U.S.S.R- — is that KGB penetrations inside
the agency have been for years sending back advance warnings.
Espionage and Counterespionage 181
foreign sources, and maybe a few insights into KGB opera-
tions against the United States and other countries. But he
would know little about the intentions of the Soviet leader-
ship or Moscow's military and nuclear secrets — the most
crucial information of all to those officials responsible for
looking after the national security of the United States. The
KGB officer, like most clandestine operators, is usually bet-
ter versed on developments in foreign countries than those
in his own nation. Although it is interesting to know what
the KGB operators know and how they acquired their
knowledge, that in itself is of little significance in achieving
U.S. intelligence goals. The justification for the counterintelli-
gence effort, although usually couched in intricate, sophisti-
cated argument, amounts to little more than "operations for
operations' sake." Admittedly, there can occasionally be a
positive intelligence windfall from a counterespionage opera-
tion; an agent recruited in a foreign service may have access
to information on his own government's secret policies and
plans. Penkovsky, who was in Soviet military intelligence
(GRU), provided his British and American case officers
with reams of documents concerning the Soviet armed forces
and their advanced weapons-development programs, in addi-
tion to clandestine operational information and doctrine.
Agents working for other foreign services have from time to
time made similar, although less valuable, contributions. But
the CIA's preoccupation with this type of clandestine
operation, often to the exclusion of a search for more impor-
tant secrets, is at least questionable.
Within the Clandestine Services, the Soviet Bloc (SB)
Division, quite obviously, is the most counterespionage-
oriented of all the area tjivisions. The rationale generally
given for this emphasis is that it is nearly impossible to
recruit even the lowest-level spy in the U.S.S.R. because of
the extremely tight internal-security controls in force there.
Among the few Soviets who can, however, move about
freely despite these restrictions are KGB and other intelli-
gence officers. They are, furthermore, part of that small
group of Soviet officials who regularly come in contact with
Westerners (often searching for their own recruits). And they
are among those officials most likely to travel outside the
Soviet Union, where recruitment approaches by CIA opera-
tors (or induced defections) can more easily be arranged.
182
The CIA and the Cult of Intelligence
Being the most accessible and least supervised of all Soviet
citizens, KGB officers are, therefore, potentially the most
recruitable.
Outside the Soviet Union, according to the SB Division's
rationale, recruitment of non-KGB agents is almost as diffi-
cult as in the U.S. S R. Most other Soviets, including the
highest officials, are usually under KGB surveillance; they
travel or live in groups, or are otherwise unreachable by the
agency's clandestine operators. Once again, it is only the
opposition intelligence officer who has the freedom of move-
ment which allows for secret contact with foreigners. The
division's efforts are therefore concentrated on seeking out
potential agents among the KGB.
There is much truth in the Soviet Bloc Division's view of
this operational problem, but the fact that the agency's oper-
ators have recruited no high-level Soviet spies and induced
almost no significant defections from the U.S.S.R. in well
over a decade raises serious questions concerning the CIA's
competence as a clandestine intelligence organization. In
fact, since the early 1960s there have been practically no CIA
attempts to recruit a Soviet agent, and only a handful of
defection inducements: Oleg Penkovsky, it must be remem-
bered, was turned away when he first tried to defect.
To be sure, there is reason for extreme care. Most Soviet
defectors who bolt to the West are greeted by the agency
with great caution because they may be KGB deceptions or
provocations. The clandestine operators are so unsure of
their ability to evaluate the intentions and establish the
legitimacy of most defectors that the CIA has set up an
inter-agency committee within the U.S. intelligence commu-
nity to review all defector cases. This bureaucratic layering
not only works to reduce the number of defectors accepted
by the U.S. government (perhaps wisely), but also serves to
spread the blame if mistakes are made.
Despite the CIA's extreme caution, however, a few
defectors, some of them KGB undercover officers, have
managed to accomplish their goal of escaping and establishing,
as it is known in the clandestine trade, their bona fides, in
spite of the agency's doubts. Svetlana Stalin succeeded sim-
ply because the CIA officers on the scene in India, with the
encouragement of Ambassador Chester Bowles, refused to
be held back by the SB Division's bureaucratic precautions.
Espionage and Counterespionage 183
It has been well established that the CIA cannot spy. in the
classical sense, against its major target, the Soviet Union.
Nor does the CIA seem to be able to conduct effective
counterespionage (in the offensive aspect) against the Soviets.
It even has difficulty dealing with the gratuitous opportuni-
ties presented by walk-ins and defectors. Much of this obvi-
ously can be attributed to the inherent difficulties involved
in operating in a closed society like the U'.S.S.R.'s, and
against a powerful, unrelenting opposition organization like
the KGB; and some of the lack of success can, too, be ex-
plained by the CIA's incompetence. But there is more to the
failure against the Soviet target than insurmountable security
problems or ineptitude. The CIA's Clandestine Services are,
to a large extent, fearful of and even intimidated by the
Soviet KGB because they ha,ve so frequently been outma-
neuvered by it.
Most Soviet spying successes against the major Western
powers have involved penetrations of their intelligence
services. The KGB, with its origins in the highly conspirato-
rial czarist secret police, has often appeared to professional
observers to be more adept at penetrating foreign intelli-
gence organizations than in recruiting ordinary spies.
Most notorious among the KGB's infiltrations of Western
intelligence (at least those that have been discovered) was
Harold "Kim" Philby, who spied for Moscow for over twenty
years while a very high-ranking official of Britain's MI-6.*
There have been several other highly damaging KGB pene-
trations of British intelligence, French and German intel-
ligence, and the services of most of the smaller N.A.T.O.
countries. And KGB agents have been uncovered on several
occasions in U.S. intelligence agencies, including the Na-
tional Security Agency, several of the military security
agencies, and the intelligence section of the Joint Chiefs of
Staff.
But as far as is publicly known, no career officer of the
CIA has ever been proved to be an enemy spy. There have
been some odd dismissals of clandestine officers from time
to time for reasons that have smacked of more than mere
*ln his memoirs (unquestionably full of KGB disinformation) Philby ex-
pressed little professional respect for the CIA's talents in counterespionage.
But he did admit that it was an agency officer (ironically, an ex-FBI agent)
who ultimately saw through his masquerade and was responsible for exposing
him to British authorities.
184
The CIA and the Cull of Intelligence
incompetence or corruption, but none of these has ever
officially been designated as a penetration. On the other
hand, foreign agents recruited by the agency have sometimes
been found to be working for an opposition service. When-
ever such a penetration is discovered in a CIA operation,
the agency's counterespionage specialists compile a damage
report assessing how much information has been revealed to
the subject and the possible repercussions of such disclosures
on other CIA activities. Similarly, agency counterespionage
officers participate in the preparation of damage reports
when a penetration is exposed elsewhere in the U.S. intelli-
gence community.
One such report was prepared in cooperation with the
Defense Department in 1966 when Lieutenant Colonel W. H.
Whalen, a U.S. Army intelligence officer working for the
Joint Chiefs of Staff, was arrested as a KGB spy. The
investigation disclosed that Whulen had had access to almost
all the U.S. national intelligence estimates of Soviet strategic
military capabilities during the "missile gap" controversy
several years earlier. Evidently, he had delivered copies of
these top-secret documents to his KGB employers.
However, the results of Whalen's actions were, upon
examination, as surprising as they were discouraging to U.S.
intelligence. A principal reason why CIA and Pentagon ana-
lysts believed there was a missile gap during the late 1950s
and early 1960s was the numerous references in speeches
made at the time by Khrushchev and other Soviet leaders
alluding to the development and deployment of Soviet long-
range nuclear missiles. These announcements, carefully timed
to correspond to the progressive phases of intercontinental
ballistic missile research, testing, production, and opera-
tional introduction to the armed forces, were studied in
great detail by the Kremlin-watchers of the U.S. intelligence
community. Learning from American scientists working on
U.S. missile programs what was technically feasible in the
field of ICBM development, and having already witnessed
the startling demonstration of Soviet space technology dem-
onstrated in the launching of Sputnik, the intelligence ana-
lysts assumed the worst — that the Soviets were well ahead of
the United States in the missile race. The analysts noted in
their estimates that the statements of the Soviet leaders were
a significant factor in making this judgment.
Neither the U-2 reconnaissance flights nor the first mis-
Espionage and Counterespionage 185
sions of American photographic satellites confirmed the fears
of the analysts, but the U.S. government took no chances,
and pressed fervently ahead with its own strategic strike
programs, especially the Minuteman ICBM and the Polaris
submarine. By 1963 it was abundantly evident that the only
"missile gap" which existed was in America's favor, created
by the rapid deployment of U.S. systems. Khrushchev and
his colleagues had deliberately attempted to mislead by clev-
erly implying a nuclear attack capability which the Soviet
Union did not possess; apparently, they were somewhat
encouraged by those U.S. intelligence estimates secretly pro-
vided by Colonel Whalen which showed how worried U.S.
officials were by the Soviet bluff. But even though deception
was at first successful, in that U.S. officials believed the
Soviet claims, it ultimately backfired as the United States
chose to accelerate its own missile-development programs,
thereby placing the Soviet Union in a position of still greater
strategic disadvantage than before.
Perhaps an even greater -service which Colonel Whalen
unintentionally performed for his country while spying for
the KGB came during the Berlin Crisis of 1961. At that time,
in addition to building the wall to separate the east and west
portions of the city, the East Germans attempted, with obvi-
ous Soviet support, to reduce access to Berlin from West
Germany. The U.S. intelligence estimate was that the com-
munists were toughening and unlikely to back down. This
gloomy but influential estimate was passed to the KGB by
Colonel Whalen, probably along with other information that
the United States would stand absolutely firm. When the
Soviets suddenly and unexpectedly eased their position, both
the White House and the intelligence community, although
pleased, were confused by Moscow's turnabout. Only years
later, during the preparation of the Whalen damage report,
did the analyst get a better idea why their original estimates
of Soviet behavior had proved to be wrong in 1961. With the
benefit of hindsight, the analysts reasoned: The Soviet lead-
ers had decided to ease their stand when they realized the
U.S. government would not back down, despite the estimate
of Soviet intransigence. Apparently afraid they might be
on the verge of provoking a major military conflict, the
Soviets abruptly softened their demands.
The unexpected benefits to the U.S. government stem-
ming from the Whalen penetration, while clearly fortuitous.
186
The CIA and the Cull of Intelligence
are not unique in clandestine operations. In 1964 it was learned
that the American embassy in Moscow had been thoroughly
bugged by the KGB. Scores of Soviet audio devices were
found throughout the building. Counterespionage and secu-
rity specialists determined that the equipment had been in-
stalled in 19S2 when the embassy had been renovated, and
that the bugs had been operational for roughly twelve years.
The damage report asserted that during this entire period — at
the height of the Cold War — Soviet intelligence had proba-
bly intercepted every diplomatic cable between Washington
and the embassy. TMs assessment was based on the discovery
cf electronic listening devices in the code room which allowed
the Soviets to hear distinctly the sounds being made by the
typewriters and cryptographic equipment. It was a reasonably
easy technological feat — well within Soviet capabilities — to
translate such sounds into their true alphabetical meaning.
U.S. suspicions about the Soviet eavesdropping were ap-
parently aroused early in 1964 when Nikita Khrushchev made
a remark to Ambassador Foy Kohler about Kohler's role in
blocking the shipment to the Soviet Union of steel for an
important pipeline. Taken in context, Khrushchev's remark
indicated to Kohler that there was a leak somewhere in
American security. Kohler started a massive investigation,
and, within a month or two, found forty-odd bugs embedded
in walls throughout the embassy. Although Kohler would
later claim there was no connection between the discovery of
the bugs and the investigation he ordered after his conversa-
tion with Khrushchev, the timing would seem to indicate
otherwise.
. . . In any case, the official damage report concluded that
for those twelve crucial years at the height of the Cold War,
. . . The damage report noted, however, that this Soviet knowl-
edge may well have worked to the advantage of the United
States . . .
Today the likelihood of the KGB eavesdropping on the
activities in an embassy code room is extremely remote. Most
State Department communications overseas are handled by
the CIA. The machines and other equipment are cushioned
and covered to mute the sounds emanating from them. The
rooms themselves are encased in lead and rest on huge
sprinni that further reduce the internal noises. Resembling
large camping trailers, the code rooms now are normally
located deep in the concrete basements of embassy buildings.
Espionage and Counterespionage 187
Access to them by sound-sensitive devices is, for all practical
purposes, impossible.
The CIA's counterespionage operators not only try to re-
cruit secret agents in opposition services like the KGB; they
also work against the so-called friendly or allied services. Off
bounds for the most part — in principle, at least — are the
intelligence agencies of the English-speaking countries, among
which there is a kind of unwritten agreement not to spy on
each other.
. . . The Agency's closest ally is British intelligence. ...(...
The CIA exchanges such a large volume of information with
British intelligence that the analytical part of the Agency, the
Directorate for Intelligence, always has several officers sta-
tioned in England for the sole purpose of facilitating the
liaison. . . .)
Attempts are made by the Intelligence Directorate to re-
$tri<:t the dissemination of highly clas.sificd analysis to foreign
services, but for the most part these are limited to relatively
minor deletions of references to collection sources. In some
instances, the practice involves simply cutting out with a
razor a few words here and there from the text of, say, a
National Intelligence Estimate on Soviet missile capabilities.
Usually this is done on only a few documents being given to
tiie British or other English-speat(ing services.
. . . Although there are a good number of American Jews
in the Clandestine Services, many veterans of the OSS and the
early CIA German and East European operations, . . . Else-
where in the Agency, Jews serve in many capacities, some
at the very top of the organization, but in accordance
with tradition, none is engaged in analytical work on the
Mideast. . . .)
Domestic Operations
On December 17, 1972, the New York Times revealed that
the CIA had secretly provided training to fourteen New
York City policemen. At the time, agency spokesman Angus
Thuermer acknowledged that other American police depart-
ments had received "similar courtesies," but he would not
specify how many. Thuermer said to the Times, "I doubt
188
The CIA and the Cult of Inietligence
very much that (CIA officials] keep that kind of information."
But New York Congressman Edward Koch persisted in seek-
ing precisely "that kind of information" from the agency.
On January 29, 1973, the CIA's Legislative Counsel, John
Maury (himself a longtime clandestine operator and former
station chief in Greece), admitted to Koch that "less than
fifty police officers all told, from a total of about a dozen
city and county police forces, have received some sort of
Agency briefing within the past two years." But again the
CIA was being less than forthcoming, for its police training
(which consisted of much more than a "briefing") had been
going on for considerably more than the two years cited by
the CIA — at least since 1967, when Chicago police received
instruction at both the agency's headquarters and at "The
Farm" in southeastern Virginia. When queried by newspaper
reporters in 1973, police authorities in Chicago denied that
any of their men had received any such agency training. But
Richard Helms, then recently departed as Director, specifi-
cally told a secret session of the Senate Foreign Relations
Committee at the beginning of February that Chicago police
had been included in the agency training effort, and his
disclosure subsequently leaked out to the press.
It was significant that when the CIA publicly owned up to
training sessions in Maury's letter to Koch, the only time
period mentioned was "the past two years"; it was likely
true that in "the past two years" fewer than fifty officers
from a dozen localities had been trained. But if the CIA had
confessed to the full extent of its pre-1971 police-training
activities, the figures would have been much larger. More
important, the agency could not have justified its domestic
police-training program, as it did, on the grounds that a
provision of the Omnibus Crime Control and Safe Streets
Act of 1968 encouraged federal law enforcement agencies to
assist local forces. That law was not passed until June 1968,
well after the CIA training had started. Of course, once the
agency had been shown to have carried out this domestic
activity, it needed such a justification or excuse: the Na -
tional Security Act of 1947 had forbidden it to exercise an y
"pol i ce, subptJena, law-enforcement powers, or internal secu -
rity functions '
" inc tadics used by the CIA to cover its tracks in this
instance were typical of the kind of deception that the agency
has generally used to conceal its numerous activities inside
Espionage and Counterespionage 189
the United States. The subjea of domestic operations is a
particularly sensitive one in the CIA, and probably no other
program is handled with greater secrecy.
CIA training of local police departments may seem like a
relatively harmless activity, but it does raise several questions.
Why did the agency at first try to cover up and then mislead
Congress, the press, and the public about its activity? Why
could the same training not have been given by the FBI,
which maintains facilities and has legal authorization for that
purpose? (Helms told the Foreign Relations Committee that
the police requested CIA assistance because the agency's
techniques in keeping intelligence files and in performing
certain kinds of surveillance were more advanced than the
FBI's.) And why have subsequent CIA Directors James
Schlesinger and William Colby not specifically ruled out any
future police training, even after the press and the Congress
have raised the questions of illegality and impropriety?
None of these questions has an obvious answer. In general,
however, the CIA does not like to admit that it has been
doing something it shouldn't have, and deceptive public
statements by the agency are as much a standard reflex
action as an indication that something particularly unsavory
has occurred. Another explanation might be that during
those days in December 1972 and January 1973 when the
police-training incident was being exposed, the Watergate
cover-up had not yet come unglued and the CIA might have
been trying to keep investigators away from its domestic
activities. A few months later, of course, the press would
discover, and various public officials would reveal, that Rich-
ard Helms had been "most cooperative and helpful" in
helping to organize the top-secret White House plan for
domestic surveillance and intelligence collection; that the
CIA had provided "technical" assistance to the White House
plumbers in their 1971 burglary of the office of Daniel
Ellsberg's psychiatrist; that the agency maintained "safe
houses" in the heart of Washington where E. Howard Hunt
was clandestinely provided with CIA-manufactured false
documents, a disguise, a speech-altering device, and a cam-
era fitted into a tobacco pouch; that five of the seven
Watergate burglars were ex-CIA employees, and one was
still on the payroll and regularly reporting to an agency case
officer; that in the week after the break-in at the Democratic
Party's headquarters, high White House officials tried to
190
The CIA and the Cull of Inielligence
involve the agency directly in the Watergate cover-up; and,
perhaps most significantly, that top CIA officials remained
silent, even in secret testimony before congressional com-
mittees, about the illegal activities they knew had taken
place. In fact, Helms' answers to the Senate Foreign Rela-
tions Committee's questions on Watergate in February and
March 1973 proved to be so evasive and misleading, particu-
larly as subsequent disclosures were made, that the Washington
Post's Laurence Stern wrote on July 10 of the same year
"that the word perjury was being uttered in Senate offices
by those who were privy to the secret testimony given by
Helms. ..."
At a February 7 hearing, for example. New Jersey's Sena-
tor Clifford Case told Helms it had come to his attention
that in 1969 or 1970 the White House had asked the various
government intelligence agencies to pool resources to learn
more about the anti-war movement. "Do you know anything,"
Case asked Helms, "about any activity on the part of the
CIA in that connection? Was it asked to be involved?"
Helms replied, "I don't recall whether we were asked, but
we were not involved because to me that was a clear viola-
tion of what our charter was." Case persisted. "What do you
do in a case like that? Suppose you were?" Helms answered,
"I would simply go to explain to the President this didn't
seem advisable." Case; "That would end it?" Helms: "Well,
I think so, normally."*
But the facts and suspicions to emerge from the Senate
Watergate hearings during the following months suggested
that this is not at all the way such matters are worked out
behind the scenes in the executive branch of the government,
raising still more questions as to the reliability of the CIA's
clandestine leadership — and the agency's role in U.S. do-
mestic intelligence operations.
'Four monlhs later a memorandum written by former While House aide Tom
Charles Huston leaked to the New York Times ll outlined a program for
domestic surveillance of U.S. citizens thut had hccn approved by President
Nixon on July 15. 1970. and (hen rescinded by him five days later. Huston
noted a scries of meetings with top officials of the FBI. the CIA. the DIA. the
NSA. and the service intelligence agencies, and said. "I went into this exer-
cise fearful that CIA would refuse to cooperate. In fact. Dick Helms was most
cooperative and helpful." According to the Huston memorandum, the authen-
ticity of which has been confirmed by the White House, the CIA was slated to
be a full participating member.
Espionage and Counterespionage 191
The CIA and the FBI
The CIA has always conducted clandestine operations within
the United States, although for the most part these have
been related to its overseas activities or their support. It was
for this purpose that the agency originally established, a
number of years ago, a special comp>onent of the Clandes-
tine Services, the Domestic Operations Division. But the
separation between foreign-oriented covert operations and
those considered essentially domestic is often vague and
confusing in the intelligence business. Thus, over the years
there has been constant bureaucratic friction between the
CIA and the FBI, which has primary responsibility for
internal security. Compromises and other working arrange-
ments have had to be evolved, allowing the CIA a certain
operational latitude within the U.S.A. and giving the bureau
in return special privileges abroad in the agency's sphere of
responsibility.
The Domestic Operations Division (DOD), with a staff of
a few hundred people and an annual budget of up to SIO
million, is a well-established part of the Clandestine Services.
Divisional headquarters for Domestic Operations is not at
the main CIA installation at Langley, but in an office build-
ing on downtown Washington's Pennsylvania Avenue, within
two blocks of the White House. This is also the Washington
"station," and its subordinate "bases" are situated in major
American cities. These offices are separate from the agency's
other facilities for routine p>ersonnel-recruiting and overt
contact with American overseas travelers. The "secret" DOD
offices serve as springboards for the Clandestine Services'
covert operations in American cities.
The DOD is surrounded by extreme secrecy, even by CIA
standards, and its actual functions are shrouded in mystery.
The extent of the agency's unwillingness to discuss the Do-
mestic Division could be seen when the CIA officer prepar-
ing the agency's annual budget request to Congress in 1968
was pointedly told by the Executive Director not to include
anything about the DOD in the secret briefing to be given to
the Senate and House appropriations committees. In at least
one other instance, Director Helms was specifically asked in
a secret congressional session about the "Domestic Opera-
tions Division." In his answer to the unsuspecting legislators,
he described the functions of the "Domestic Contact Service"
192
The CIA and the Cull of Intelligence
— the overt agency office that recruits American travelers to
be unofficial CIA eyes and ears abroad — which at the time
was a completely separate entity housed outside the Clandes-
tine Services.
The Domestic Division's task, like all agency clandestine
area divisions, is the collection of covert intelligence and the
conduct of other secret operations — but in this instance in-
side the United States. It operates some of the espionage
programs aimed against foreign students and other visitors
to the United States, but by no means all of them. Recruit-
ment of a Soviet diplomat at the United Nations or in
Washington would fall under the Clandestine Services' So-
viet Bloc Division. Programs with Cuban-Americans in Flor-
ida would be handled by the Western Hemisphere Division,
the Covert Action Staff, or the Special Operations (para-
military) Division — depending on the agent's intended role.
There is a relatively widespread feeling among observers
of the CIA's Clandestine .Services that the DOD would like
to do more on the American scene than it apparently has up
to now. It is also believed that if the Nixon administration's
domestic-security plan of 1970 and the related surveillance of
American dissidents had ever been put into operation — which
the White House has denied but various press accounts have
suggested — the DOD probably would have become deeply
involved. The rationale used by the CIA would most likely
have been the same one mentioned by Director Colby at his
confirmation hearing: that the agency can rightfully spy on
Americans "involved with foreign institutions." To the mis-
trustful minds of the Clandestine Services, the problems
caused in the United States by dissidents, civil-rights activists,
and anti-war protesters certainly conjured up the specter of
foreign influences. After all, the covert officers reasoned,
the dissident political groups in the United States were obvi-
ously receiving financial support from somewhere, and the
sources could be foreign. The clandestine operators familiar
with the CIA's secret efforts to aid and strengthen anti-
government groups in Eastern Europe and elsewhere easily
calculated that somehow the communist countries were now
getting even by using American groups to stir up trouble in
the United States. CIA support for dissident movements in
Eastern Europe never made any less real the source of their
grievances, but that did not prevent the agency from using
them to put pressure on the Soviet government and perhaps
Espionage and Counterespionage 193
even to divert Moscow's attention from its struggle with the
West. And in the late 1960s and early 1970s American dissi-
dents were certainly causing difficulties for the U.S. govern-
ment. Since the Clandestine Services knew it had exploited
similar circumstances in Eastern Europe, its operators natu-
rally looked for KGB involvement in the United States.*
The Johnson White House, however, had chosen not to
involve the CIA deeply in domestic clandestine operations at
the time when it first asked, back in the beginnings of the
anti-war movement. The Domestic Operations Division was
given only a small piece of the action — namely, to increase
its surveillance of the movement, and its activities against
direct foreign involvement in the movement. The FBI, too,
was instructed to expand its domestic political-intelligence
capabilities. But the lion's share of the rg^P ^J Q'ji b ^ litv in I he
m atter was efven to thi; Pfintag j^f) — in particular, the Arm^y —
apparently under a ne w ly di scovered, but outdatecT eqver-
-ge ncy law granting the'PresKTenl special power to iitilize the
"military and take whatevefrffe'asures he deemEd necessary
to put down'BoiTTnfic'unresl aii tT "co n spjra c i e 5_ LifefaT T(5ja I
justification probably was not TFie^'oIeTeason why Army
intelligence was assigned as the main instrument with which
to attack the domestic targets; size was another consideration.
Neither the CIA nor the FBI had the manpower for an
all-out clandestine offensive against the radicals. Nor did
either have available large numbers of young intelligence
personnel who could actually penetrate the movement. But
Army Intelligence soon blundered, and its domestic surveil-
lance programs were exposed in January 1970 by ex-agent
Christopher Pyle, writing in the Washington Monthly. Dur-
ing the following year the military services were forced to
withdraw from their massive attack against domestic dissidents;
the field was once again left to the "professionals" — the FBI
and the CIA.
This situation, however, soon resulted in an open break
between the agency and the bureau. The New York Times
attributed the split, in late 1971, to a minor event involving
jurisdictional control over the handling of an informant/agent
*Oandestine Services had sympathizers everywhere. H. R. Haldeman, in a
secret memo made public during the Senate Watergate hearings: "We need
our people to put out the story on the foreign or Communist money that was
used in support of demonstrations against the President in 1972."
194
The CIA and the Cull of Intelligence
in Denver, Colorado. But shortly afterward Sam Papich, the
FBI's officer in charge of liaison with the CIA, and a mem-
ber of J. Edgar Hoover's immediate staff, was dismissed by
the bureau chief. And only weeks later William Sullivan,
head of the FBI's Division of Internal Security, the bureau's
representative on the U.S. Intelligence Board, and a good
friend of the CIA, was locked out of his office and fired by
Hoover.
In the aftermath of the troubles at the FBI, the press
earned a series of reports of Hoover's and the bureau's
incompetence. Some comments, attributed to "authoritative
sources" in the intelligence community, accused the FBI of
having done a poor job of protecting the nation's internal
security in recent years. These same sources also noted that
the bureau had uncovered only a handful of foreign spies in
the United States during the past several years, and de-
scribed the FBI as lacking in the "sophisticated" approach to
modem counterespionage. Such statements, in substance and
in phraseology, clearly originated with, or were inspired by,
the CIA.
What the public was unaware of at the time, however, was
that since 1970 — long before the open CIA-FBI split — the
White House had been planning to expand domestic intelli-
gence operations. And while the CIA had gone along with
and encouraged the secret policy, the FBI had resisted it. It
was, in fact, Hoover's personal refusal to support the new
policy that resulted in the collapse of the White House plan.
And it was in these circumstances that a paranoid President
then established the infamous "plumbers" squad, with which
the CIA was evidently quite willing to cooperate — and with
which the FBI seems to have been reluctant to become
involved.
When CIA Director William Colby was asked at his Senate
confirmation hearings, in the fall of 1973, what he believed to
be the proper scope of CIA activities svithin the United
States, his first response was "We obviously have to run a
headquarters here; we have to recruit people for our staffs,
and so forth, and we have to conduct investigations on those
people. . . ." No one disputes the need for the agency to
conduct certain routine administrative business within the
United States, but few people realize that what the "head-
quarters" needs to be "run" includes dozens of buildings in
Espionage and Counterespionage 195
the Washington area alone, large training facilities at several
locations in Virginia, a paramilitary base in North Carolina,
secret air bases in Nevada and Arizona, communications and
radio intercept bases around the country, scores of "dummy"
commercial organizations and airlines, operational offices in
more than twenty major cities, a huge arms warehouse in
the Midwest, and "safe houses" for secret rendezvous in
Washington and other cities. While most of these are ori-
ented toward foreign operations, some are used full- or
part-time for purely domestic activities.
Colby continued: "We have to contract with a large num-
ber of American firms for the various kinds of equipment
that we might have need for abroad." Again, this is on the
surface a legitimate function. The CIA every year purchases
tens of millions of dollars' worth of goods from domestic
companies — everything from office supplies to esoteric espio-
nage equipment. But Colby carefully left out any mention of
those other "purchases" — the services provided for by the
CIA's contractual relationships with universities, "think
tanks," and individual professors.
Many of these came to light in the winter of 1967 after
Ramparts first revealed the CIA subsidization of the Na-
tional Student Association and as exposure followed expo-
sure Richard Helms asked his Executive Director to report
back to him exactly what the CIA was doing on American
campuses. The Executive Director quickly found that he had
no easy task before him, since nearly every agency compo-
nent had its own set of programs with one or more Ameri-
can universities and there was no central office in the CIA
which coordinated or even kept track of these programs. A
special committee was formed to compile a report, and its
staff officers spent weeks going from office to separate office
to put together the study.
The committee compiled data on the hundreds of college
professors who had been given special clearances by the
agency's Office of Security to perform a wide variety of tasks
for different CIA components. The Intelligence Directorate,
for example, had a corps of consultants on campus who did
historical and political research, much like normal scholars,
with the difference that they were almost never permitted to
publish their findings; in a few instances, that rule was
suspended on condition that the source of their findings was
196
The CIA and the Cull of Intelligence
not identified, and if the work neatly coincided with a pre-
vailing CIA propaganda line.
Similarly, the Directorate of Science and Technology em-
ployed individual professors, and at times entire university
departments or research institutes, for its research and devel-
opment projects. (This apart from the millions of dollars of
work the S&T Directorate contracted out every year to
private companies and "think tanks.") Research of this type
included the development
LINE DELETED
These technical contracts were almost always drawn up
under the cover of being between the scholar (or the university)
and some government agency other than the CIA (the De-
fense Department or some component thereof were the most
commonly used).
In many cases, the CIA's research involvement on the
campuses went much deeper than simply serving as the
patron of scholarly work. In 1951, CIA money was used to
set up the Center of International Studies at the Massachu-
setts Institute of Technology. A key figure at the MIT Cen-
ter was Walt Rostow, a political scientist with intelligence
ties dating back to OSS service during World War II who
later became President Johnson's Assistant for National Se-
curity Affairs. In 19S2, Max Milllkan, who had been Director
of the CIA's Office of National Estimates, became head of
the center. This linkage between the CIA and research insti-
tutions on campus and in the private sector became standard
practice in later years, just as it did for the Pentagon. But
whereas the Pentagon's procedures could to some extent be
monitored by the Congress and the public, the CIA set up
and subsidized its own "think tanks" under a complete veil
of secrecy. When in 1953 the MIT Center published The
Dynamics of Soviet Society, a book by Rostow and his
colleagues, there was no indication to the reader that the
work had been financed by CIA funds and that it reflected
the prevailing agency view of the Soviet Union. MIT cut off
its link with the center in 1966, but the link between the
center and the CIA remained, and the agency has continued
to subsidize a number of similar, if smaller, research facili-
ties around the country.
The compilers of the 1967 study on CIA ties to the aca-
Espionage and Counterespionage 197
demic community also found that the Clandestine Services
had their own research links with universities, for the pur-
pose of developing better espionage tools (listening devices,
advanced weapons, invisible inks, etc.). But for the covert
operators, research was not the primary campus interest. To
the Clandestine Services the universities represented fertile
territory for recruiting espionage agents. Most large Ameri-
can colleges enrolled substantial numbers of foreign students,
and many of these, especially those from the Third World,
were (and are) destined to hold high positions in their home
countries in a relatively few years. TTiey were much easier to
recruit at American schools — when they might have a need
for money, where they could be easily compromised, and
where foreign security services could not interfere — than
they would be when they returned home. To spot and
evaluate these students, the Clandestine Services maintained
a contractual relationship with key professors on numerous
campuses. When a professor had picked out a likely candidate,
he notified his contact at the CIA and, on occasion, partici-
pated in the actual recruitment attempt. Some professors
performed these services without being on a formal retainer.
Others actively participated in agency covert operations by
serving as "cut-outs," or intermediaries, and even by carry-
ing out secret missions during foreign journeys.
The Clandestine Services at times have used a university
to provide cover or even assist in a covert operation overseas.
The best-known case of this sort was exposed in 1966 when
Ramparts revealed that Michigan State University had been
used by the CIA from 1955 to 1959 to run a covert police-
training program in South Vietnam. The agency had paid $25
million to the university for its service, and five CIA opera-
tors were concealed in the program's staff.
The 1967 study on the CIA's ties with American universities
covered all the activities described above, but the staff offi-
cer responsible for preparing it was told that no research
program concerning the use of drugs was to be mentioned in
the report.*
The final study that the Executive Director presented to
'The agency's interest in drugs was more than a passing one; one officer was
assigned to travel all over Latin America, buying up all sons of hallucinatory
drugs which might have some application to intelligence activities and operations.
198
The CIA and the Cull of Inlelligence
Director Helms was several inches thick, but the man who
wrote it was still not sure that it was complete, less because
he feared having overlooked some particular CIA compo-
nent or proprietary organization which had its own univer-
sity program than because he suspected that information had
been withheld from him, particularly by the covert operators.
Because of its sensitivity, only one copy of the study was
made, and it was turned over to the Director. Helms re-
viewed it and agreed with its conclusion: that all the CIA's
campus activities were valuable to the agency and should be
continued, except for a few individual contracts that had
become outdated or too exposed. In the end, there was
selective pruning of these programs, but essentially the CIA's
activities with and at the universities continued as they had
before the NSA scandal broke. They do so today.
The lone copy of the study was placed in the CIA Execu-
tive Director's safe for future reference. Within a few weeks
after Helms' review, the report had to be pulled out; a
controversy had erupted at a Midwestern university over
alleged contracts between a certain professor and the CIA.
When the study was consulted to find out if the allegations
were correct, neither the professor nor the program he was
associated with was listed anywhere in the bulky document.
There was a collective sigh of relief in the agency's executive
suite and some mumbling about irresponsible students mak-
ing ridiculous charges. Shortly thereafter, however, the
Director's staff found out that the exposed professor was
genuine and had telephoned his CIA contact to discuss how
he should react to the charges. He was told to get a teaching
job elsewhere — and he did.
Soon after, another incident occurred.
10 LINES DELETED
Returning to Director Colby's explanation of the CIA's
domestic activities:
We also, I believe quite properly, can collect foreign
intelligence in the United States, including the request-
ing [sic] American citizens to share with their Govern-
ment certain information they may know about foreign
situations, and we have a service that does this, and I
am happy to say a very large number of American
Espionage and Counierespionnge 199
citizens have given us some information. We do not pay
for that information. We can protect their proprietary
interest and even protect their names if necessary, if
they would rather not be exposed as the source of that
information.
What Colby' was referring to was the Domestic Contact
Service (DCS). The DCS's primary function has traditionally
been to collect intelligence from Americans without resort-
ing to covert methods. Until early 1973 the DCS was part of
the CIA's Intelligence Directorate, the overt analytical part
of the agency. The DCS's normal operating technique is to
establish relationships with businessmen, scholars, tourists,
and other travelers who have made trips abroad, usually to
Eastern Europe or China. These people are asked to pro-
vide information voluntarily about what they have seen or
heard on their journeys. Most often they are contacted by
the agency after they have returned home, but occasionally,
if the CIA hears that a particular person plans to visit, say, a
remote part of the Soviet Union, the DCS will get in touch
in advance and ask the traveler to seek out information on
certain targets. In the past the DCS has, however, shied
away from assigning specific missions, since the travelers are
not professional spies and may easily be arrested if they take
their espionage roles too seriously.
On several occasions over the years, the Clandestine Serv-
ices have expressed an interest in assuming control of the
DCS — with the argument that in the interest of efficiency all
CIA intelligence collection by human sources should be run
out of the same directorate. During the late 1960s the Clan-
destine Services were specifically rebuffed after a crude take-
over attempt, but as a compromise measure Director Helms
allowed clandestine operators to be assigned to the DCS in
order to better coordinate intelligence collection. The DCS
itself remained under the Intelligence Directorate. But in
early 1973 Director James Schlesinger approved the transfer
of the DCS to the Clandestine Services. Although there was
no public notice of this change and travelers were not in-
formed they were now dealing with the CIA's clandestine
operators, Senator William Proxmire somehow got the word
and told the Senate on August 1 , 1973, that he was "particularly
disturbed" by the shift. "Mr. Colby says," Proxmire explained,
"that this is to improve the coordination of its collection
200
Tht CIA and the Cull of Intelligence
activities with those of the Agency abroad. I find this disturb-
ing because of the possibility that the DCS. which has a
good reputation, may now become 'tainted' by the covert
side of the Agency."
Again. Colby at the Senate hearing:
We also, I believe, have certain support activities that
we must conduct in the United States in order to con-
duct foreign intelligence operations abroad; certain struc-
tures are necessary in this country to give our people
abroad perhaps a reason for operating abroad in some
respects so that they can appear not as CIA employees
but as representatives of some other entity.
Here Colby was undoubtedly talking about the CIA's
training facilities, weapons, warehouses, secret arrangements
with U.S. companies to employ "deep cover" CIA operators,
covert dealings with arms dealers, and other back-up activi-
ties necessary to support paramilitary operations and other
clandestine doings overseas. He may also have been refer-
ring to the CIA's use of American foundations, labor unions,
and other groups as fronts to fund covert-action programs
overseas, or to the proprietary corporations which operate
for the CIA around the world. In this last category are the
complex web of agency-owned airlines — Air America, Air
Asia, Civil Air Transport. Southern Air Transport, Inter-
mountain Aviation, ( DELETED ) — all of which have head-
quarters in the United States, and some of which maintain
extensive facilities here. These airlines are run in direct
competition with private companies, receive charter con-
tracts from the U.S. government, and often operate domesti-
cally, in addition to taking on secret missions for the CIA
abroad.
4 LINES DELETED
All these companies — and others not yet revealed — do much
more than provide cover for CIA employees, as Colby implied.
They represent businesses worth hundreds of millions of
dollars that can be used in all manner of operations by the
CIA both at home and overseas.
Espionage and Counterespionage 201
Colby concluded:
Lastly, I think that there are a number of activities in
the United States where foreign intelligence can he col-
lected from foreigners, and as long as there is foreign
intelligence, I think it is quite proper that we do this.
In this instance Colby was referring in part to the CIA's
efforts to recruit foreign students on American campuses,
and a similar program, operated with the cooperation of
military intelligence, to suborn foreign military officers who
come to the United States for training. But the CIA also
targets other foreign visitors to the U.S. — businessmen,
newsmen, scholars, diplomats. U.N. delegates and employees,
even simple tourists. It is specifically for the recruitment and
handling of foreign agents that the CIA maintains safe houses
in Washington, New York, and other cities.
Another group of Americans who are very much targets
of the CIA are recent immigrants. Almost from the moment
Fidel Castro took power in 1959, CIA operators have worked
closely with Cuban exiles, particularly in Florida. Most of
the recruiting and some of the training for the agency's
abortive invasion of the island in 1961 took place in the
Miami area. Even after that fiasco the CIA has continued to
use Cuban- Americans (few as celebrated as "retained" agent —
and Watergate burglar — Eugenio Martinez) to carry out guer-
rilla operations against the Castro government. It has also
been quite active among Eastern European emigres in the
United States. In November 1964, Eerik Heine, an Estonian
refugee living in Canada, sued for slander another Estonian
named Juri Raus, a resident of Hyattsville, Maryland. Raus,
who was American national commander of the Legion of
Estonian Liberation, was alleged to have denounced Heine
as an agent of the KGB. Raus' defense in court was based
not on the specifics of the case but on an affidavit submitted
by then CIA Deputy Director Richard Helms stating that
Raus was a CIA agent and had spoken out against Heine
among Estonian-Americans under direct agency orders. Helms
submitted two more affidavits to the court stating that the
CIA had further ordered Raus not to testify in court, but
explaining he had said what he had "to protect the integrity
of the Agency's foreign intelligence sources." The federal
judge, Roszel C. Thomsen, ruled in the CIA's favor and did
202
The CIA and the Cull of Iruelligence
not accept the plaintiff s contention that even if the agency
had ordered that the alleged slander be committed, it had no
power to do so under the National Security Act of 1947,
which forbade the CIA to exercise any "internal security
functions."
In his decision. Judge Thomsen wrote:
It is reasonable that emigre groups from behind the Iron
Curtain would be a valuable source of information as to
what goes on in their homeland. The fact that the intelli-
gence source is located in the United States does not
make it an "internal security function" over which the
CIA has no authority. The court concludes that activi-
ties by the CIA to protect its foreign intelligence sources
located in the United States are within the power granted
by Congress to the CIA.
By extension, it might also be argued that any "foreign
intelligence source" located in the United States, 6migr^ or
not, is fair game for the CIA. Clearly, American citizens
traveling abroad are eligible: clearly, researchers in universi-
ties are eligible; and if the agency can come up with a
reason — such as the threat of "foreign influence" in Ameri-
can politics — then everyone's eligible. And that eligibility
extends not only to the honor of being consulted, cajoled,
and financed, but to the privilege of being investigated,
suborned, or whatever else the covert operators might wish
to do.
PART III
8.
THE CLANDESTINE MENTALITY
The greatest dangers to liberty lurk in insidious
encroachment by men of zeal, well-meaning but
without understanding.
— JUSTICE BRANDEIS. 1928
The nation must to a degree take it on faith that
we too are honorable men devoted to her service.
— CIA DIRECTOR HELMS. 1 971
The man who masterminded and oversaw the CIA's clandes-
tine operations in Indochina during much of the 1960s was
William Colby. He is a trim, well-groomed Princeton and
Columbia Law School graduate who, if he were taller, might
be mistaken for a third Bundy brother. He started in the
intelligence business during World War II with the Office of
Strategic Services. His field assignments included parachut-
ing into German-occupied France and Norway to work with
the anti-Nazi underground movements, during which he
showed a remarkable talent for clandestine work. After the
war he joined the newly formed CIA and rose rapidly through
its ranks, becoming an expert on the Far East. From 1959
until 1962 he served as the CIA's chief of station in Saigon.
In 1962 he was named head of the Far East Division of the
Clandestine Services.
In this position Colby presided over the CIA's rapidly
expanding programs in Southeast Asia. Under his leadership
(but always with White House approval) the agency's "secret"
war in Laos was launched, and more than 30,000 Meo and
other tribal warriors were organized into the CIA's own
Armee Clandestine. Colby's officers and agents directed —
and on occasion participated in — the battles against the Pathet
Lao, in bombing operations by the CIA's proprietary company
Air America, and in commando-type raids into China and
North Vietnam, well before Congress had passed the Gulf of
Tonkin Resolution.
206
The CIA and the Cult of Intelligence
Colby seemed to keep the secret operation always under
tight control. His colleagues in the CIA marveled at his
ability to run all the agency's activities in Laos with no more
than forty or fifty career CIA officers in the field. There
were, to be sure, several thousand other Americans support-
ing the CIA effort, but these were soldiers of fortune or
pilots under contract to the agency, not career men. From
the CIA's point of view, the war in Laos was cheap (costing
the agency only S20 to S30 million a year) and well managed.*
The number of Americans involved was small enough that a
relatively high degree of secrecy could be maintained. In
contrast to the tens of thousands of Laotians who died in the
war, few Americans were killed, and those who were
casualties were not CIA career officers but rather mercenaries,
contract officers, and personnel of the agency's air proprie-
taries. The agency considered Laos to be a very successful
operation. And Colby received much of the credit for keep-
ing things under control.
The agency's clandestine activities in Vietnam were not so
well organized, concealed, or successful as its Laotian
operation. In the mid-I%Os the CIA was swept along with the
rest of the U.S. government into launching huge programs
designed to support the war effort. The agency would have
preferred to run relatively small, highly secret operations (or
to have had complete control of covert action), but the
stiffer and stiffer demands of the Johnson administration
made this impossible. Thus, if the President wanted a larger
contribution from the CIA, the CIA would contribute. In
1965 Colby, still stationed in Washington, oversaw the found-
ing in Vietnam of the agency's Counter Terror (CT) program.
In 1966 the agency became wary of adverse publicity sur-
rounding the use of the word "terror" and changed the
name of the CT teams to the Provincial Reconnaissance
Units (PRUs) Wayne Cooper, a former Foreign Service
officer who spent almost eighteen months as an advisor to
South Vietnamese internal-security programs, described the
operation: "It was a unilateral American program, never
recognized by the South Vietnamese government. CIA repre-
sentatives recruited, organized, supplied, and directly paid
*The f ull cost of Ihc war was aciuully closer to a half-hillion dollars a year, but
most of this was funded by other agencies — the Defense Department and
AID.
The Clandestine Mentality
207
CT teams, whose function was to use Vietcong techniques
of terror — assassination, abuses, kidnappings and intimida-
tion — against the Vietcong leadership." Colby also super-
vised the establishment of a network of Provincial Interroga-
tion Centers. One of these centers was constructed, with
agency funds, in each of South Vietnam's forty-four provinces.
An agency operator or contract employee directed each
center's operation, much of which consisted of torture tactics
against suspected Vietcong, such torture usually carried out
by Vietnamese nationals.
In 1967 Colby's office devised another program, eventually
called Phoenix, to coordinate an attack against the Vietcong
infrastructure among all Vietnamese and American police,
intelligence, and military units. Again CIA money was the
catalyst. According to Colby's own testimony in 1971 before
a congressional committee, 20,587 suspected Vietcong were
killed under Phoenix in its first two and a half years.'
Figures provided by the South Vietnamese government credit
Phoenix with 40,994 VC kills.
Also in 1967, President Johnson sent Robert Komer, a
former agency employee who had joined the White House
staff, to Vietnam to head up all the civilian and military
pacification programs. In November of that year, while Komer
was in Washington for consultation, the President asked him
if there was anything he needed to carry out his assignment.
Komer responded that he certainly could use the services of
Bill Colby as his deputy. The President replied that Komer
could draft anybody he chose. A year later Colby succeeded
Komer as head of the pacification program, with the rank of
ambassador. The longtime clandestine officer had ostensibly
resigned from the CIA to~become a State Department
employee.
One of Colby's principal functions was to strengthen the
Vietnamese economy in order to improve the lot of the
'Even Colby has admitted that serious abuses were committed under Phoenix.
Former intelligence officers have come before congressional committees and
elsewhere to describe repeated examples of torture and other particularly
repugnant practices used by Phoenix operatives. However, according to Da-
vid Wise, writing in the A/eiv York Times Magazine on July 1 . 1973, "Not one
of Colby's friends or neighbors, or even his critics on the Hill, would, in their
wildest imagination, conceive of Bill Colby attaching electric wires to a man's
genitals and personally turning the crank. 'Not Bill Colby . . . He's a Princeton
man. ' "
208 The CIA and the Cult of Intelligence
average Vietnamese peasant, and thereby make him less
susceptible to Vietcong appeals and more loyal to the Thieu
government. To win over the peasants, Colby insisted that
corruption within the Saigon government had to be greatly
reduced. At one point he even proposed a systematic cam-
paign called the "Honor the Nation" program, which was to
be an attack on illegal practices at all levels of Vietnamese
society. At that time Colby was well aware th-it black-market
trafficking in money was one of the biggest corruption prob-
lems in Vietnam. All U.S. personnel in Vietnam were under
strict orders not m^viy vielnamcse pTasTnT orr thc-bluih'-
niHrFeT ^ "n d a [I'uTtlTyPT'^lllTT Vrn'e r'^Tris "Tiad^lfier bee'n*'c5ur1 -
rh.irir 3Te3T:y the mililarv »7 Tfred t iyilfiei r civifi an "ag encies
Tor violating these nrderv Hut i.n\hy also It new that for
many "VeSrt tfie (_lATinf"bceh obtaining lens "Oi miii ions' of
tlcillars'm piastcrs orT the_blactrjTiar^et, either in Horfg Kong
or in SaT|onrTrftfiIs~way tTie agency couTdgefTwo TO IflTee
A3ffllJfflaMy, tine tJIaiiiiestine'^er»icf!! drfllfTICH, Claclt-murTel
piasters were untraceable and thus ideal for secret operations.*
Although from a strict budgetary point of view the agency's
currency purchases were sound fiscal policy, they directly
violated both Vietnamese law and U.S. official policy.
Moreover, the purchases helped to keep alive the black
market which the U.S. government was professedly working
to stamp oui.
During the mid-1960s while Colby was still in Washington,
the Bureau of the Budget learned that the CIA budget for
Vietnam provided for dollar expenditures figured at the
legal exchange rate. Since in truth the agency was buying its
piasters on the black market, it actually had two to three
times more piasters to spend in Vietnam than its budget
showed. The Bureau of the Budget then insisted that all
figures be listed at the actual black-market rate, so at least
examiners of the agency's budget in Washington would have
a true idea of how much money the CIA was spending. The
bureau then also tried to cut U.S. government costs by
having the CIA buy piasters for other agencies on the black
market. The agency was unenthusiastic about this idea and
'Given more than SO(),(X)U Americans in Vietnam, all using Viemamcse piasters,
and a chaotic Vietnamese banking system, the CIA could of course have
obtained untraceable or "sterile" money without resorting to the black market.
The Clandestine Mentality
209
managed to avoid doing it. not because massive black-market
purchases would have negated the government's avowed
efforts to support the piaster, but because the agency did not
want the secrecy of its money-exchange operations disturbed.
Compared to other aspects of the Vietnam war, the CIA's
use of the black market is not a major issue. It simply points
up the fact that the CIA is not bound by the same rules that
apply to the rest of the government. The Central Intelli-
gence Agency Act of 1949 makes this clear: "The sums made
available to the Agency may be expended without regard to
the provisions of law and regulations relating to the expendi-
tures of Government."*
Thus, a William Colby can. with no legal or ethical conflict,
propose programs to end corruption in Vietnam while at the
same time condoning the CIA's dubious money practices.
And extending th e ct)nceji|^of the ■'££"5^/'' immunitj^ 10,l.aw
and morals, a C^Tfby can JevTse anBToiret;! terror tactics,
'secr et wars, and the like,";!!!^ n't He~ narne nf t[F'Tl9^^'^CV , 'Hljs
i s'tT^e clandestine men taiiTv^ a separatjcin of personal moral-
Tty and conduct from actions, no matter'Tio«nieBSS6^"wRich
are taken IiTtFie name of the United States government and,
more specifically, the Central Intelligence Agency.
When Colby left his post as deputy ambassador to Viet-
nam in 1971, the CIA immediately "rehired" him, and Direc-
tor Helms appointed him Executive Director-Comptroller,
the number-three position in the agency. When James
Schlesinger took over the agency in early 1973, he made
Colby chief of the Clandestine Services. In May 1973, at the
height of the personnel shake-ups caused by the Watergate
affair. President Nixon moved Schlesinger to the Defense
Department and named Colby to head the CIA. Thus, after
about four months under the directorship of the outsider
Schlesinger, control of the agency was again in the hands of
a clandestine operator.
Senator Harold Hughes, for one, expressed grave reserva-
tions about Colby's appointment as CIA Director in a Sen-
ate speech on August 1, 1973: "I am fearful of a man whose
'The CIA in Vietnam even escaped ihe Johnson administration's worldwide
edict that all cars purchased by the American government would be of
American manufacture. While State Department and AID personnel were
forced to navigate Saigon's narrow streets In giant Chcvrolets and Plymoulhs,
the agency motorpool was full of much smaller and more practical Japanese
Toyotas.
210
The CIA and the Cull of Intelligence
experience has been so largely devoted to clandestine opera-
tions involving the use of force and manipulation of factions
in foreign governments. Such a man may become so enam-
ored with these techniques that he loses sight of the higher
purposes and moral constraints which should guide our
country's activities abroad."
Deeply embedded within the clande stine mentality is the
b elief that h^iman i^thira gnJ soci al laws Eave no FeSfTTT^ o n
c5v"er( op eration s or their pracTitioriers.'TTTe' mteTITgerice
profession, because oF rtTToftyTiatural security" goals, is
free from all moral restrictions. There is no need to wrestle
with technical legalisms or judgments as to whether some-
thing is right or wrong. The determining factors in secret
6e"m ain tan ned''
^ne of the lessons learned from the Watergate experience
is the scope of this amorality and its influence on the clandes-
tine mentality. E. Howard Hunt claimed that his participa-
tion in the Watergate break-in and the other operations of
the plumbers group was in "what I believed to be the . . .
the best interest of my country." In this instance, at least,
we can accept Hunt as speaking sincerely. He was merely
reflecting an attitude that is shared by most CIA operators
when carrying out tfie orders of their superiors.
Hunt expanded on this point when interrogated before a
federal grand jury in April 1973 by Assistant U.S. Attorney
Earl Silbert.
SILBERT: Now while you worked at the White House,
were you ever a participant or did you ever have knowl-
edge of any other so-called "bag job" or entry operations?
HUNT: No, sir.
SILBERT; Were you aware of or did you participate in
any other what might commonly be referred to as illegal
activities?
hunt: Illegal?
SILBERT: Yes, sir.
HUNT: I have no recollection of any, no, sir.
SILBERT: What about clandestine activities?
hunt: Yes, sir.
SILBERT: All right. What about that?
The Clandestine Mentality
211
HUNT: rm no t quibbli iifc^bm. Uiere!j. fluite a di.ffer-
pnrehetwppn ^nmp t hing that\ illegal jlnd something
IKatVclandesiiflf.,
SILBERtT Well, in your terminology, would the entry
into Mr. Fielding's [Daniel Ellsberg's psychiatrist) office
have been clandestine, illegal, neither or both''
HUNT: I would simply call it an entry operation
conducted under the auspices of competent authority.
Within the CIA, similar activities are undertaken with the
consent of "competent authority." The Watergate conspir-
ators, assured that "national security" was at stake, did not
question the legality or the morality of their methods; nor do
most CIA operators. Hundreds if not thousands of CIA men
have participated in similar operations, usually — but not
always — in foreign countries; all such operations are exe-
cuted in the name of "national security." The clandestine
mentality not only allows it; it veritably wills it.
In early October 1969, the CIA learned through a secret
agent that a group of radicals was about to hijack a plane in
Brazil and escape to Cuba. This intelligence was forwarded
to CIA headquarters in Langley, Virginia and from there
sent on an "eyes only" basis to Henry Kissinger at the White
House and top officials of the Slate Department, the De-
fense Department, and the National Security Agency. Within
a few days, on October 8, the same radicals identified in the
CIA report commandeered at gunpoint a Brazilian commer-
cial airliner with 49 people aboard, and after a refueling stop
in Guyana, forced the pilot to fly to Havana. Neither the
CIA nor the other agencies of the U.S. government which
had advance warning of the radicals' plans moved to stop
the crime from being committed, although at that time the
official policy of the United States — as enunciated by the
President — was to take all possible measures to stamp out
aerial piracy.
Afterwards, when officials of the Slate Department ques-
tioned their colleagues in the CIA on why preventive mea-
sures had not been taken to abort the hijacking, the agency's
clandestine operators delayed more than a month before
responding. During the interim, security forces in Brazil
succeeded in breaking up that country's principal revolution-
ary group and killing its leader, Carlos Marighella. Shortly
after the revolutionary leader's death on November 4, the
212
The CIA and the Cull of Intelligence
CIA informally passed word back to the State Department
noting that if any action had been taken to stop the October
skyjacking, the agency's penetration of the radical movement
might have been exposed and Marighella's organization could
not have been destroyed. While it was never quite dear
whether the agent who alerted the clandestine operators to
the hijacking had also Tingered Marighella, that was the
impression the CIA tried to conv ey to the Stale Department.
The agency implied it had not prevented the hijacking be-
cause to have done so would have lessened the chances of
scoring the more important goal of "neutralizing" Marighella
and his followers. To the CIA's clandestine operators, the
end — wiping out the Brazilian radical movement — apparently
had jnstined the means, thus permitting the hijacking to
take place aad needlesdy endangering forty-nine innocent
lives in the process.
During the last twenty-five years American foreign policy
has been dominated by the concept of containing communism;
almost always the means employed in pursuit of "national
securit>'" have been justified by the end. Since the "free
world" was deemed to be under attack by a determined
enemy, sincere men in the highest government posts be-
lieved — and still do believe — that their country could not
survive without resorting to the same distasteful methods
employed by the other side. In recent years the intensity of
the struggle has been reduced as monolithic communism has
split among several centers of power; as a result, there have
been tactical changes in America's conduct of foreign affairs.
Yet the feeling remains strong among the nation's top officials,
in the CIA and elsewhere, that America is responsible for
what happens in other countries and that it has an inherent
right — a sort of modern Manifest Destiny — to intervene in
other countries' internal affairs. Changes may have occurred
at the negotiating table, but not in the planning arena;
intervention — either military or covert — is still the rule.
To the clandestine operations of the CIA, nothing could be
more normal than the use of "dirty tricks" to promote the
U.S. national interest, as they and their agency determine it.
In the words of former Clandestine Services chief Richard
Bissell, CIA men "feel a higher loyalty and . . . they are
acting in obedience to that higher loyalty." They must be
able to violate accepted standards of integrity and decency
The Clandestine Mentality
213
when the CIA's objectives so demand. Bisscll admitted in a
1965 television interview that agency operators at times car-
ried out actions which "were contrary to their moral precepts"
but they believed "the morality of . . . cold war is so infi-
nitely easier than the morality of almost any kind of hot war
that 1 never encountered this as a serious problem."
Perhaps as a consequence of the confused morality that
guides him. a clandestine operator is dedicated to the utmost
secrecy. Convicted Watergate burglar Bernard Barker, who
long worked with and for the agency, described these opera-
tors in a September 1972 New York Times interview: "They're
anonymous men. They hate publicity; they get nervous with
it. They don't want to be spoken of. They don't even want
to be known or anythmg like that." And nearly always
accompanying this passion for secrecy comes an obsession
with deception and manipulation. These traits, developed in
the CIA's training programs, are essential elements for suc-
cess in the operator's career. He learns that he must become
expert at "living his cover." at pretending he is something he
is not. Agency instructors grade the young operators on how
well they can fool their colleagues. A standard exercise
given to the student spies is for one to be assigned the task
of finding out some piece of information about another.
Since each trainee is expected to maintain a false identity
and cover during the training period, a favorite way to coax
out the desired information is to befriend the targeted trainee,
to win his confidence and make him let down his guard. The
trainee who gains the information receives a high mark; his
exploited colleague fails the test. The "achievers" are those
best suited, in the view of the agency, for convincing a
foreign official he should become a traitor to his country; for
manipulating that official, often against his will; and for
"terminating" the agent when he has outlived his usefulness
to the CIA.
Operating with secrecy and deception gradually becomes
second nature to the clandestine operator as his early train-
ing progresses and he moves into an actual field assignment.
The same habits may at times carry over into his dealings
with his colleagues, and even his family. Most operators see
no inconsistency between an upstanding private life and
immoral or amoral work, and they would probably say that
anyone who couldn't abide the dichotomy is "soft." The
double moral standard has been so completely absorbed at
214
The CIA and the Cull of Intelligence
the CIA that Allen Dulles once stated, "In my ten years
with the Agency I only recall one case of many hundreds
where a man who had joined the Agency felt some scruples
about the activities he was asked to carry on." Even today
Dulles' estimate would not be far off.
As much as the operator believes in the rightness of his
actions, he is forced to work in an atmosphere that is poten-
tially demoralizing. He is quite often on the brink of the
underworld, or even immersed in it, and he frequently turns
to the least savory types to achieve his goals. Criminals are
useful to him, and are often called upon by him, when he
does not want to perform personally some particularly
distasteful task or when he docs not want to risk any direct
agency involvement in his dirty work. And if the clandestine
operator wants to use attractive young women to seduce
foreign officials, he does not call on female CIA employees.
Instead he hires local prostitutes, or induces foreign girls to
assume the seductress's role, hoping to use his women to
ferret information out of targeted opponents and to black-
mail them into cooperating with the CIA.
Other CIA men regularly deal with black-marketeers to
purchase "laundered" currency. The agency cannot very
well subsidize a political party in South Vietnam or buy
labor peace on the Marseilles docks with money that can be
traced back to the CIA. Thus, CIA "finance officers" perma-
nently assigned to Hong Kong, Beirut, and other interna-
tional monetary centers frequently turn to the world's illegal
money changers to support agency clandestine operations.
"Sterile" weapons for CIA paramilitary activities are ob-
tained in the same fashion from the munitions merchants
who will provide arms to anyone able to pay the price. And
when untraceable troops are needed to assist a CIA-sponsored
revolution or counter-revolution, the agency will put out the
word in such mercenary centers as Brussels, Kinshasa, and
Saigon that it is hiring soldiers of fortune willing to support
any cause for a price.
Yet there are certain standards the CIA's clandestine oper-
ator must maintain in order to hold on to his job and the
respect of his colleagues. By the agency's code, he is not
supposed to profit personally from his activities. If he were
involved in narcotics traffic for his own gain, he would
probably be fired for having been "corrupted by the trade."
But if the same CIA man were involved in narcotics traffic
The Clandestine Mentality
215
because he was using his narcotics connections to blackmail
a Soviet official, he would be considered by his colleagues to
be doing his work well.
While the CIA has never trafficked in dope as a matter of
official policy, its clandestine personnel have used this
trade — as they have used almost every other criminal activity
known to man — in the pursuit of their goals. In Laos the
CIA hoped to defeat the Pathet Lao and North Vietnamese
(and, thus, "stop communism"); for that purpose, it was
willing to supply guns, money, and training to the Meo tribe,
the part of the Laotian population most eager to fight for the
agency. The CIA was willing to overlook the fact that the
Meos' primary cash crop was opium and that they continued
to sell the drug during most of the years that they partici-
pated in the "secret" war as the "cutting edge" of the
anti-communist force in Laos. While the planes of the CIA
proprietary airline, Air America, were on occasion used to
carry opium and while some of the highest military officers
supported by the agency were also the kingpins of the drug
trade, the agency could still claim that it did not officially
sanction these activities. But not until the heroin traffic from
Southeast Asia was perceived as a major American problem
a few years ago did the CIA make any serious effort to curb
the flow of the drug, for it mattered not what sort of people
the Meo were — what mattered was what they were willing
and able to do for the CIA. The agency would hire Satan
himself as an agent if he could help guarantee the "national
security."
The key to a successful espionage operation is locating
and using the right agent. There are seven basic areas
of agent relations — spotting, evaluation, recruiting, testing,
training, handling, and termination. Each deserves extended
examination.
Spotting: This is the process of identifying foreigners or
other persons who might be willing to spy for the CIA.
The agency operator mingles as much as possible with the
native population in the country to which he is assigned,
hoping to spot potential agents. He normally concentrates
on officials in the local government, members of the military
services, and representatives of the intelligence agencies of
the host country. People in other professions, even if
recruitable, usually do not have access to the kind of strate-
216
The CIA and the Cult of Intelligence
gic or high-level information which the CIA is seeking. Most
operators work out of the local U.S. embassy; their diplo-
matic cover allows a convenient approach to their target
groups through the myriad of officials and social contacts
that characterize the life of a diplomat, even a bogus one
serving the CIA. Some agency officers pose as military men
or other U.S. government representatives — officials of the
AID, the USIA, and other agencies. In addition to official
cover, the CIA sometimes puts officers under "deep cover"
as businessmen, students, newsmen, or missionaries.
The CIA operator is constantly looking for indications of
vulnerability on the part of potential foreign agents. The
indicators may come from a casual observation by the opera-
tor at a cocktail party, gossip picked up by his wife, sugges-
tions from already recruited agents, or assistance furnished
— wittingly or unwittingly — by a genuine American diplomat
or businessman. The CIA operator receives instruction, based
on studies made by agency specialists or American college
professors under contract to the CIA, on what kinds of
people are most susceptible to the intrigues and strategies of
clandestine life. Obviously, the personality of the potential
spy varies from country to country and case to case, but
certain broad categories of preferable and susceptible agent
types have been identified. The most sought-after infor-
mants are foreign officials who are dissatisfied with their
country's policies and who look to the United States for
guidance. People of this sort are much more likely to be-
come loyal and dedicated agents than those whose primary
motivation is monetary. Money certainly can go a long way
in obtaining information, especially in the Third World, but
the man who can be bought by the CIA is also a relatively
easy mark for the opposition. On the other hand, the agent
who genuinely believes that what he is doing has a higher
purpose will probably not be vulnerable to approaches from
the KGB or other opposition services, and he is less likely to
be plagued by the guilt and the accompanying psychological
deterioration which frequently hamper the work of spies.
The ideological "defector in place" is the prize catch for
CIA operators. Other likely candidates for spying are offi-
cials who have expensive tastes which they cannot satisfy
from their normal incomes, or those with an obviously un-
controllable weakness for women, other men, alcohol, or
drugs.
The Clandestine Mentality
217
The operator does not always search for potential agents
among those who are already working in positions of
importance. He may take someone who in a few years may
move into an important assignment (with or without a little
help from the CIA). Students are considered particularly
valuable targets in this regard, especially in Third World
countries where university graduates often rise to high-level
governmental positions only a few years after graduation. In
Latin American and African countries the agency puts spe-
cial emphasis on seeking agents in the armed forces, since so
many of these nations are ruled or controlled by the military.
Hence, the "cleared" professors on the CIA's payroll at
American universities with substantial foreign enrollments,
and military training officers at such places as the field
command school at Fort Leavenworth, Kansas, are prime
recruiters.
In the communist countries, as we have said, agency opera-
tors tend to focus on members of the opposition intelligence
services in their search for secret agents.
Evaluation: Once a potential spy has been spotted, the
agency makes a thorough review of all information available
on him to decide whether he is, or someday will be, in a
position to provide useful intelligence. The first step in the
evaluation process is to run a "namecheck," or trace, on the
person, using the CIA's extensive computerized files located
at headquarters in Langley. This data bank was developed by
International Business Machines exclusively for the CIA
and contains information on hundreds of thousands of persons.
Any relevant biographical information on the potential agent
found in the files is cabled back to the field operator, who
meanwhile continues to observe the prospect and makes
discreet inquiries about his background, personality, and
chances for advancement. The prospect will probably be put
under surveillance to learn more of his habits and views.
Eventually a determination will be made as to the prospect's
probable motivation (ideological, monetary, or psychological)
for becoming a spy. If he hasn't any such motivation, the
CIA searches for ways — blackmail and the like — of pressur-
ing him. At the same time, the case officer must determine if
the prospect is legitimate or if he is an enemy plant — a provo-
cation or a double agent. Some member of the CIA team,
perhaps the original spotter, will attempt to get to know the
potential agent on a personal basis and win his confidence.
218
The CIA and the Cult of Intelligence
Recruiting: At the conclusion of the evaluation period,
which can last weeks or months, CIA headquarters, in
consultation with the field component, decides whether or
not the prospective agent should be approached to spy for
the agency. Normally, if the decision is affirmative, a CIA
outsider will approach the prospect. Neither the spotter nor
the evaluator nor, for that matter, any member of the local
agency team will generally be used to make the recruitment
"pitch"; if something goes wrong, the individual being propo-
sitioned will therefore be unable to expose any of the CIA
operators. As a rule, the CIA officer giving the pitch is
furnished with a false identity and given an agency-produced
fake American passport. The "pitchman" can quickly slip
out of the country in case of trouble.
Once the recruiter is on the scene, agency operators will
concoct a meeting between him and the prospective agent.
The pitchman will be introduced to the target under care-
fully prearranged — and controlled — circumstances, allowing
the operator who made the introduction to withdraw dis-
creetly, leaving the recruiter alone with the potential agent.
Steps also will have been taken to provide the recruiter with
an escape route in the event that the pitch should backfire.
If he is clever in his approach, the recruiter makes his pitch
subtly, without any overt statements to reveal his true pur-
pose or afniiation with the agency.
If the potential agent has previously voiced opposition to
his government, the recruiter is likely to begin with an appeal
to the man's patriotic obligations and higher ideological
inclinations. Ways by which he could aid his country and its
people through secret cooperation with a benevolent foreign
power will be suggested. If, on the other hand, the prospect
is deemed susceptible to money, the recruiter probably will
play to this point, emphasizing that he knows of ways for
the right individual to earn big money — quickly and easily. If
the subject is interested in power, or merely has expensive
habits to satisfy (sex, drugs, and so forth), if he wants to
defect from his country, or simply wishes to get away from
his family and social situation, the recruiter will attempt to
concentrate his efforts on these human needs, all the time
offering suggestions as to how they may be met through
cooperation with "certain parties." People volunteer or agree
to spy on their governments for many reasons. It is the task
The Clandestine Mentality
219
of the recruiter to determine what reason — if one exists — is
most likely to motivate the potential agent.
If the agency has concluded that the prospect is vulnerable
to blackmail, thinly veiled threats of exposure will be em-
ployed during the pitch. In some cases, however, the re-
cruiter may directly confront the potential agent with the
evidence which could be used to expose him, in an effort to
shock him into accepting the recruitment pitch. And in all
cases the meeting between the recruiter and the prospect
will be monitored either by audio surveillance (i.e., a tape
recording) or some other method — photographs, fingerprints,
or anything which will produce evidence that can later be
used to incriminate the prospect. If not at first susceptible to
blackmail, the prospect who wittingly or unwittingly enter-
tains a recruitment job may afterward find himself entrapped
by evidence which could be employed to ruin his career or
land him in jail.
After the prospect accepts the CIA's offer, or yields to
blackmail, the recruiter will go into the details of the
arrangement. He may offer an agent with high potential $500
to $1,000 a month, say, partly in cash but mostly by deposit
in an escrow account at some American or Swiss bank. He
will try to keep the direct non-escrow payments as low as
possible: first, to prevent the man from going on a spending
spree which could attract the unwanted attention of the local
security service, and, second, to strengthen his hold over the
spy. The latter reason is particularly important if the agent is
not ideologically motivated. The recruiter may pledge that
the CIA will guarantee the safety of the agent or his family,
in case of difficulties with the local police, and he may
promise a particularly valuable agent a lifelong pension and
even American citizenship.
The fulfillment of such pledges varies greatly, depending
on the operational situation and the personality of the CIA
case officer in charge. Some are cynical, brutal men whose
word, in most instances, is absolutely worthless. Others,
though, will go to extraordinary lengths to protect their
agents. In the early 1960s in Syria, one CIA man endangered
his life and that of a trusted colleague to exfiltrate an agent
who had been "rolled up" (i.e., captured) by the local
security service, tortured, and forced to confess his complic-
ity in the CIA's operations there. Although the agent, ren-
dered a physical and mental wreck, was no longer of any use
220
The CIA and the Cult of Intelligence
to the CIA, the two operators put him in the trunk of a private
automobile and drove him to a nearby country — and safety.
The recruiter will try to get the new agent, upon agree-
ment to work for the CIA, to sign a piece of paper that
formally and evidentially connects him with the agency, a
paper which can later be used to threaten a recalcitrant
agent with exposure, should he balk at continuing to work
for the CIA.
The recruiter's last function is to set up a meeting between
the new agent and the CIA operator stationed in that coun-
try who will serve as his case officer. This will often involve
the use of prearranged recognition signals. One technique,
for example, is to give the agent a set of unusual cufflinks
and lell him that he will soon be approached by a man
wearing an identical pair. Another is to set up an exchange
of code words which the case officer can later use to identify
himself to the agent. When all this is accomplished, the
recruiter breaks off the meeting and as soon as possible
thereafter leaves the country.
When the recruitment pitch doesn't work . . .
The recruitment pitch sometimes goes wrong. One such
case occurred in . . . when CIA coven operators . . . spotted
and evaluated . . . official. . . the . . . back at headquarters
in Langley. was so excited by the prospect of recruiting a . . .
official thai he took personal control of the operation. He did
not want to entrust responsibility to the field station. . . When
the time came to select a recruiter,. . . chose himself and
ordered . . . to assist him. The station . . . would have pre-
ferred someone from . . . to make the recruitment pitch, since
the operation already had had to be delayed for several pre-
cious days while . . . made final arrangements to travel . . .
Bui ... /if had the support of CIA Director Helms.
Traveling . . . arrived . . . followed a day later declaring
himself to be . . . the two CIA men went . . . to talk to . . .,
who had no idea the CIA was interested in him. . . . Highly
embarrassed, they returned to CIA headquarters to make
their report. Not only had the operation been a complete
failure, the two senior clandestine professionals had commit-
ted an even worse sin in the Agency's view. . . .* meeting
'Alt names in this account are real. The authors feet no compunction in not
u.ung pseudonyms, since a skeletal report of the incident listing names bur filled
viih disinformation appeared in the April 2X I'fth, Washinglan Pdsl as an
Associated Press dispatch.
The Clandestine Menialiiy
221
with a potential agent/defector in a local "gasthaus" only to
find that the occupants of the nearby tables were not Vien-
nese but rather members of a KGB goon squad. In that
instance, when fighting erupted, he managed lo escape by
fleeing to the men's room and ignominlously crawling to
safety through the window above the toilet.
Testing: Once an agent has been recruited, his case officer
immediately tests his loyalty and reliability. He will be given
certain tasks to carry out which, if successfully performed,
will establish his sincerity and access to secret information.
The agent may be asked, for example, to collect information
on a subject about which, unknown to him, the agency has
already acquired a great deal of knowledge. If his reporting
does not jibe with the previous intelligence, he is likely to be
either a double agent attempting to mislead his case officer
or a poor source of information clumsily trying to please his
new employer. When feasible, the agent's performance will
be carefully monitored during the testing period through
discreet surveillance.
In addition, the new agent will almost certainly be re-
quired to take a lie-detector test. CIA operators place heavy
reliance on the findings of a polygraph machine — referred to
as the "black box" — in their agent operations. Polygraph
specialists are available from headquarters and several of the
agency's regional support centers to administer the test on
special assignment. According to one such specialist, testing
foreign agents calls for completely different skills than ques-
tioning Americans under consideration for career service
with the CIA. He found Americans to be normally straight-
forward and relatively predictable in their responses to the
testing, making it comparatively simple to isolate someone
who is not up lo the agency's standards. But testing foreign
agents, he says, is much more difficult. Adjustments must be
made to allow for cultural differences, and for the fact that
the subject is engaging in clearly illegal and highly dangerous
secret work. An ideologically motivated agent, furthermore,
may be quite emotional and thus unusually difficult to "read,"
or evaluate, from the machine's measurements. One spying
solely for monetary gain or to satisfy some private vice may
be impossible to read because there is no way of gauging his
moral limits. Congenital liars, psychopaths, and users of
certain drugs can frequently "beat the black box." Accord-
ing to the polygraph expert, a decision on the agent's reliabil-
222
The CIA and the Cult of Intelligence
ity and sincerity is, therefore, based as much on the intuition
of the tester as on the measurements of the machine. The
agent, however, is led to believe that the black box is infallible,
so if he is neither a well-trained double agent nor clinically
abnormal, he will more than likely tell the truth.
Training. When the agent has completed the testing process,
he is next given instruction in the special skills required for
his new work as a spy. The extent, location, and specific
nature of the training varies according to the circumstances
of the operation. In some instances the secret iistruction is
quite thorough; on other cases the logistics sf such training
are nearly impossible to handle, and consequently there is
virtually none. In such circumstances the agent must rely on
his instinct and talents and the professionalism of his case
officer, learning the ways of clandestine life as the operation
develops.
When training can be provided to an agent, he will be
taught the use of any equipment he may need — a miniature
camera for photographing documents, for example. He will
be instructed in one of several methods of covert communi-
cations — secret writing, ooded or encrypted radio transmis-
sions, or the like. He will also learn the use of clandestine
contacts. And he will be given training in security precautions,
such as the detection and avoidance of surveillance.
Depending upon the agent's availability, however, and his
estimated worth in the eyes of the Clandestine Services, he
may receive only a few short lessons from his case officer on
how to use an audio device or how to communicate with the
agency through a series of cut-outs. Or he may be asked to
invent a cover story to give to his family and his employer
that will allow him to spend several days or even a couple of
weeks at an agency safe house, learning the art of espionage.
He may even seek an excuse to leave the country so he can
receive instruction at a CIA facility in another nation, where
he is much less likely to be observed by his country's security
service. Or he may even be brought to the United States for
training, constantly monitored while here by the CIA Office
of Security. Special training facilities for foreign recruits,
isolated from all other activities, exist at Camp Peary — "The
Farm" — in southern Virginia.
While the tradecraft taught to the agent is unquestionably
useful, the instruction period also serves as an opportunity
for his case officer and the other instructors to motivate him
The Clandestine Menialiry
223
and increase his commitment to the CIA's cause. The agent
is introduced to the clandestine proficiency and power of the
agency. He sees its tightly knit professional camaraderie. He
learns that although he is abandoning his former way of life,
he now has a chance for a better one. Good work on his part
will be rewarded with political asylum; the government he is
rejecting may even be replaced by a superior one. Thus his
allegiance to his new employer is further forged. It is the
task of the case officer to maintain this attitude in the mind
of his agent.
Handling: Successful handling of an agent hinges on the
strength of the relationship that the case officer is able to
establish with his agent. According to one former CIA
operator, a good case officer must combine the qualities of a
master spy, a psychiatrist, and a father confessor.
There are two prevailing views within the CIA's Clandes-
tine Services on the best way to handle, or run, an agent.
One is the "buddy" technique, in which the case officer
develops a close personal relationhip with his agent and
convinces him that they are working together to attain an
important political goal. This approach can provide a power-
ful motivating force, encouraging the agent to take great
risks for his friend. Most senior operators believe, however,
that the "buddy" technique leads to the danger of the case
officer forming an emotional attachment to his agent, some-
times causing the CIA man to lose his professional objectivity.
At the other end of the agent-handling spectrum is the
"cynical" style, in which the operator, while feigning per-
sonal concern for the agent, actually deals with him in a
completely callous manner — one that may border on ruth-
lessness. From the beginning, this case officer is interested
only in results. He drives the agent to extremes in an at-
tempt to achieve maximum operational performance. This
method, too, has its drawbacks: once the agent senses he is
merely being exploited by his case officer, his loyalty can
quickly evaporate.
Agents are intricate and, often, delicately balanced in-
dividuals. The factors which lead them into the clandestine
game are many and highly complex. The stresses and pres-
sures under which they must function tend to make such
men volatile, often unpredictable. The case officer, therefore,
must continually be alert for any sign that his agent is
unusually disturbed, that he may not be carrying out his
224
The CIA and the Cult of Intelligence
mission. TTie operator must always employ the right mixture
of flattery and threats, ideology and money, emotional at-
tachment and ruthlessness to keep his agent actively working
for him.
With the Soviet Oleg Penkovsky, his British and CIA
handlers found that flattery was a particularly effective method
of motivation. Although he preferred British manners,
Penkovsky greatly admired American power. Accordingly,
he was secretly granted U.S. citizenship and presented with
his "secret" CIA medal. As a military man, he was quite
conscious of rank; consequently, he was made a colonel in
the U.S. Army to show him that he suffered no loss of status
because of his shift in allegiance.
On two occasions while Penkovsky was an active spy, he
traveled outside the U.S.S.R. on official duty with high-level
delegations attending Soviet-sponsoted trade shows. Both
times, first in London and then in Paris, he slipped away
from his Soviet colleagues for debriefing and training ses-
sions with British and American case officers. During one of
the London meetings, he asked to see his U.S. Army uniform.
None of the CIA men, nor any of the British operators, had
anticipated such a request. One quick-thinking officer,
however, announced that the uniform was at another safe
house and that driving there and bringing it back for
Penkovsky to see would take a while. The spy was temporar-
ily placated, and a CIA case officer was immediately dis-
patched to find a colonel's uniform to show to the agent.
After scurrying around London for a couple of hours in
search of an American Army colonel with a build similar to
Penkovsky's, the operator returned triumphantly to the de-
briefmg session just as it was concluding — uniform in hand.
Penkovsky was pleased.
Months later, in Paris, the CIA operators were better
prepared. A brand-new uniform tailored to Penkovsky's mea-
surements was hung in a closet in a room adjacent to where
he was being debriefed, and he inspected it happily when the
meeting was concluded.
In the 19S0s the CIA recruited an Eastern European intelli-
gence officer in Vienna whose motivation, like Penkovsky's,
was essentially ideological. While he was promised a good
salary (and a comfortable pension upon the completion of
the operation, at which time he would formally defect to the
United States)^ his case officer avoided making any direct
The Clandestine Mentality
225
payments to him in Vienna in order not to risk attracting the
opposition's attention to him. The agent well understood the
need for such precautions, yet after he had been spying for a
while, he shocked his case officer one day by demanding a
fairly substantial amount of cash. He refused to say why he
wanted the money, but it was obvious to his case officer
that the agent's continued good work for the agency was
contingent on getting the money he had requested. After
consultations with the local CIA station chief and with
headquarters, it was finally decided that the risk must be
taken and the agent was given the money, with the hope that
he would not do something outlandish or risky with it.
Agency operators then put him under surveillance to learn
what he was up to. To their consternation, they discovered
him the following weekend on the Danube River cruising
back and forth in a motorboat which he had just bought. A
few days afterward his case officer confronted him and de-
manded that he get rid of the boat, for it was not something
a man of his ostensibly austere circumstances could possibly
have purchased on his own salary. The agent agreed, casu-
ally explaining that ever since he was a small boy he had
wanted to own a motorboat. Now that yearning was out of
his system and he was quite willing to give up the boat.
Another Eastern European, who spied briefly for the CIA
years later, refused all offers of pensions and political asy-
lum in the West. He wanted only Benny Goodman records.
One of the biggest problems in handling an agent is caused
by the changeover of case officers. In keeping with the
CIA's policy of employing diplomatic and other forms of
official cover for most of its operators serving abroad, case
officers masquerading as U.S. diplomats, AID officials, De-
partment of Defense representatives, and the like, must be
transferred every two to four years to another foreign coun-
try or to Washington for a headquarters assignment, as is
customary with genuine American officials. A departing case
officer introduces his replacement to all his agents before he
leaves, but often the agents are initially reluctant to deal
with a new man. Having developed an acceptable working
relationship with one case officer, they usually are not eager
to change to another. Their reluctance is often heightened
by the agency's practice of assigning young case officers to
handle already proven agents. In this way, junior operators
can gain experience with agents who, as a rule, do not need
226
r/ie CIA and the Cult of Intelligence
as much professional guidance or sympathetic "hand-holding"
as newly recruited ones. Most agents, however, feel that
dealing with an inexperienced officer only increases the risks
of compromise. All in all, making the changeover can be
quite sticky, but it is almost always accomplished without
permanent damage to the operation. If persuasion and prom-
ises are not adequate to retain the agent's loyalty, threats of
blackmail usually are. The agency precaution of amassing
incriminating evidence — secret contracts, signed payment
receipts, tape recordings, and photographs — generally will
convince even the most reluctant agent to see things the
CIA's way.
In certain highly sensitive operations the problem of case-
officer changeover is avoided in deference to the wishes of a
particularly highly placed agent. The potential damage to
the operator's cover by his prolonged service in a given
country is considered of less importance than the mainte-
nance of the delicate relationship he has developed with the
agent. Similarly, in those situations where a CIA operative
has established a special ... a chief of state, such as in ... ,
Iran, Taiwan, and other countries, the agency officer may
serve as many as six or eight years on the operation before
being replaced. And when he is eventually transferred to
another post, great care is taken to select a replacement who
will be acceptable to the friendly chief of state.
Termination: All clandestine operations ultimately come
to an end. Those dependent upon agent activities have a
short life expectancy and often conclude suddenly. The agent
may die of natural causes or by accident — or he may be
arrested and imprisoned, even executed. In any such event,
the sole consideration of the CIA operators on the scene is
to protect the agency's interests, usually by covering up the
fact that the individual was a secret agent of the U.S.
government. Sometimes, however, the agency itself must
terminate the operation and dispose of the agent. The deci-
sion to terminate is made by the CIA chief of station in the
country where the operation is in progress, with the ap-
proval of agency headquarters. The reason for breaking with
an agent may be simply his loss of access to the secrets that
the CIA is interested in acquiring; more complicated is emo-
tional instability, lack of personal trustworthiness endanger-
ing the operation, or threat of imminent exposure and arrest.
Worst of all, there may be a question of political unreli-
The Clandestine Mentaliry
111
ability — it may be suspected that the man is. or has become,
a double agent, provocation, or deception controlled by an
opposition intelligence service.
The useless or unstable agent can usually be bought off or.
if necessary, successfully threatened. A reliable or useful
agent in danger of compromise or exposure to the opposition,
or an agent who has fulfilled his agreement as a spy and has
performed well, can be resettled in another country, pro-
vided with the necessary funds, even assisted in finding
employment or. at least, retraining for a new profession. In
those cases where the agent has contributed an outstanding
service to the CIA at great personal risk, particularly if he
burned himself out in so doing, he will be brought to the
United States for safe resettlement. The Director of Central
Intelligence, under the CIA Act of 1949, can authorize the
"entry of a particular alien into the United States for perma-
nent residence ... in the interest of national security or the
furtherance of the national intelligence mission." The agent
and his family can be granted "permanent residence without
regard to their inadmissibility under the immigration or any
other laws and regulations."
Resettlement, however, does not always go smoothly. And
sometimes this is the fault of the CIA. In the late 19S0s,
when espionage was still a big business in Germany, former
agents and defectors were routinely resettled in Canada and
Latin America. The constant flow of anti-communist refu-
gees to those areas was loo much for the agency's Clandes-
tine Services to resist. From time to lime, aa active agent
would be inserted into the resettlement process. But the
entire operation almost collapsed when, within a matter of
months, both the Canadian and Brazilian goveramenis dis-
covered that the CIA was using it as a means to plant
operating agents in their societies.
Not all former agents are willing to be resettled in the
United States, especially not on the CIA's terms. In the
1960s a high-ranking Latin American official who had been
an agent for years was forced for internal political reasons to
flee his native country. He managed to reach Mexico City,
where agency operators again made contact with him. In
consideration of his past services, the agency was willing to
arrange for his immigration to the U.S. under the 1949 CIA
law if he would sign an agreement to remain quiet about his
secret connection with the U.S. government and not become
228
The CIA and the Cull of Intelligence
involved in exile political activities in this country. The Latin
Amencan, who had ambitions to return tnumphantly to his
native country one day, refused to forgo his right to plot
against his enemies back home, and wanted residence in the
United States without citizenship, thus presenting the CIA
with a difficult dilemma. As long as the former agent re-
mained unhappy and frustrated in Mexico City, he repre-
sented a threat that his relationship with the agency and
those of the many other CIA penetrations of his government
which he knew about might be exposed. As a result, CIA
headquarters in Langley sent word to the station in Mexico
City that the ex-agent could enter the country without the
usual preconditions. The agency's top offlcials hoped that he
could be kept under reasonable control and prevented from
getting too deeply involved in political activities which would
be particularly embarrassing to the U.S. government.
It is only logical to believe that there are instances when
termination requires drastic action on the part of the operators.
Such cases are, of course, highly sensitive and quite uncom-
mon in the CIA. But when it does become necessary to
consider the permanent elimination of a particularly threat-
ful agent, the final decision must be made at the highest
level of authority, by the Director of Central Intelligence.
With the exception of special or paramilitary operations,
physical violence and homicide are not viewed as acceptable
clandestine methods — unless they are acceptable to the Di-
rector himself.
Two aspects of clandestine tradecraft which have particular
applicability to classical espionage, and to agent operations
in general, are secret communications and contacts. The
case ofHcer must set up safe means of communicating with
his agent; otherwise, there will be no way of receiving the
information that the agent is stealing, or of providing him
with instructions and guidance. In addition to a primary
communication system, there will usually be an alternate
method for use if the primary system fails. From time to
time, different systems will be employed to reduce the chances
of compromising the operation. As with most activities in
the intelligence game, there are no hard and fast rules gov-
erning communication with secret agents. As long as the
methods used are secure and workable, the case officer is
The Clandestine Meniality
229
free to devise any means of contact with his agent that is
suitable to the operational situation.
Many agents want to pass on their infonnation verbally to
the case officer. From their point of view, it is both safer and
easier than dealing with official papers or using spy equipment,
either of which could clearly incriminate them if discovered
by the local authorities. The CIA, however, prefers docu-
ments. Documents can be verified, thus establishing the
agent's reliability. They can be studied and analyzed in greater
detail and with more accuracy by the intelligence experts at
headquarters. In the Penkovsky case, for example, the se-
cret Soviet documents h^ provided were far more valuable
than his personal interpretations of events then occurring in
Moscow's military circles.
On the other hand, some agents want to have as little
personal contact as possible with their case officers. Each
clandestine meeting is viewed as an invitation to exposure
and imprisonment, or worse. Such agents would prefer to
communicate almost exclusively through indirect methods or
even by mechanical means (encoded or encrypted radio
messages, invisible ink, micro-dots, and so on). But the CIA
insists on its case officers having personal contact with their
agents, except in exceptionally risky cases. Periodically, the
spy's sincerity and level of motivation must be evaluated in
face-to-face meetings with the operator.
Each time the case officer has a personal contact with his
agent, there is the danger that the two will be observed by
the local security forces, or by a hostile service such as the
KGB. To minimize the risk of compromise, indirect meth-
ods of contact are employed most of the time, especially for
the passing of information from the agent to the operator.
One standard technique is the use of a cut-out, an intermedi-
ary who serves as a go-between. The cut-out may be witting
or unwitting; he may be another agent; he may even reside
in another country. Regardless, his role is to receive mate-
rial from either the agent or the case officer and then relay it
to the other, without being aware of its substance.
Another technique is the dead-drop, or dead-letter drop.
This is a kind of secret post-office such as a hollow tree, the
underside of a park bench, a crevice in an old stone wall —
any natural and unlikely repository that can be utilized for
transferring materials. (One of the dead-drops used in the
Penkovsky operation was the space behind the steam-heat
230
The CIA and the Cull of Intelligence
radiator in the entry of an apartment building in Moscow).
The agent simply deposits his material in the dead-drop at a
prearranged time; later it is "serviced" by the case officer or
a cut-out engaged for this purpose.
Still another frequently used technique is that of the brush
contact, in which the agent and his case officer or a cut-out
meet in passing at some prearranged public place. The agent
may encounter his contact, for example, on a crowded sub-
way platform, in a theater lobby, or perhaps on a busy
downtown street. Acting as if they are strangers, the two will
manage to get close together for a moment, long enough for
one to slip something into the other's hand or pocket. Or
they may quickly exchange newspapers or briefcases. Such a
contact is extremely brief as well as surreptitious, and usu-
ally it is quite secure if well executed.
Although the case officer makes frequent use of indirect
contacts, he still must arrange personal meetings with his
agent from time to time. Whenever there is a clandestine
meeting — on a bus, in a park, at a restaurant — other CIA
operators keep watch as a precaution against opposition
monitoring or interference. This is known in the covert
business as countersurveillance. The case officer works out
safe and danger signals in advance of each rendezvous with
both the agent and the countersurveillance team. In this
way, the operator, the agent, or any member of the team
can signal to the others to proceed with the meeting or to
avoid or break off contact if something seems out of the
ordinary. Safe houses (CIA-maintained residences) are also
used for meetings with agents, especially if there is a lot to
be discussed. A safe house has the advantage of providing
an atmosphere where the agent and the case officer can
relax and talk freely without fear of surveillance, but the
more frequently one location is used, the more likely it is to
be discovered by the opposition. The need for secrecy can
keep the clandestine operator busy; but it is a need on which
the clandestine operator thrives.
Agency Culture
A few years ago Newsweek magazine described the CIA as
the most secretive and tightly knit organization (with the
possible exception of the Mafia) in American society. The
characterization is something of an overstatement, but it
The Clandestine Menialiiy
231
contains more than a kernel of truth. In its golden era,
during the height of the Cold War, the agency did possess a
rare elan; it had a stuff of imaginative and daring officers at
all levels and in all directorates. But over the years the CIA
has grown old, fat, and bureaucratic. The esprit de corps and
devotion to duty its staff once h<id, setting the agency apart
from other government departments, has faded, and to a
great degree it has been replaced by an outmoded, doctri-
naire approach to its missions and functions. The true pur-
pose of secrecy — to keep the opposition in the dark about
agency policies and operations — has been lost sight of. Today
the CIA often practices secrecy for secrecy's sake — and to
prevent the American public from learning of its activities.
And the true purpose of intelligence collection — to monitor
efficiently the threatening moves of international adversaries —
has been distorted by the need to nourish a collective clan-
destine ego.
After the U.S. invasion of Cambodia in 1970, a few hundred
CIA employees (mostly younger officers from the Intelli-
gence and Science and Technology directorates, not the Clan-
destine Services) signed a petition objecting to American
policies in Indochina. Director Richard Helms was so con-
cerned about the prospect of widespread unrest in the agency's
ranks and the chance that word of it might leak out to the
public that he summoned all the protesters to the main
auditorium and lectured them on the need to separate their
personal views from their professional duties. At the same
time, similar demonstrations on the Cambodian issue were
mounted at the State Department and other government
agencies. Nearly every newspaper in the country carried
articles about the incipient rebellion brewing in the ranks of
the federal bureaucracy. The happenings at the CIA, which
were potentially the most newsworthy of all, were, however,
never discovered by the press. In keeping with the agency's
clandestine traditions, CIA employees had conducted a se-
cret protest.
To agency personnel who had had the need for secrecy
drilled into them from their moment of recruitment, there
was nothing strange about keeping their demonstration hid-
den from public view. Secrecy is an absolute way of life at
the agency, and while outsiders might consider some of the
resulting practices comical in the extreme, the subject is
232
The CIA and the Cull of Inielligence
treated with great seriousness in the CIA. Training officers
lecture new personnel for hours on end about "security
consciousness," and these sessions are augmented during an
employee's entire career by refresher courses, warning posters,
and even the semi-annual requirement for each employee to
review the agency's security rules and to sign a copy, as an
indication it has been read. As a matter of course, outsiders
should be told absolutely nothing about the CIA and fellow
employees should be given only that information for which
they have an actual "need to know."*
CIA personnel become so accustomed to the rigorous
security precautions (some of which are indeed justified)
that they easily accept them all, and seldom are caught in
violations. Nothing could be more natural than to work with
a telephone book marked sflkbt, an intentionally incom-
plete telephone book which lists no one working in the
Clandestine Services and which in each semi-annually re-
vised edition leaves out the names of many of the people
employed by the overt directorates, so if the book ever falls
into unauthorized hands, no enterprising foreign agent or
reporter will be able to figure out how many people work at
CIA headquarters, or even how many work in non-clandestine
jobs. Those temporarily omitted can look forward to having
their names appear in the next edition of the directory, at
which time others are selected for telephonic limbo. Added
to this confusion is the fact that most agency phone numbers
are regularly changed for security reasons. Most employees
manage to keep track of commonly called numbers by listing
them in their own personal desk directories, although they
have to be careful to lock these in their safes at night — or
else risk being charged with a security violation. For a first
violation the employee is given a reprimand and usually
assigned to several weeks of security inspection in his or her
of rice. Successive violations lead to forced vacation without
pay for periods up to several weeks, or to outright dismissal.
Along with the phone books, all other classified material
(including typewriter ribbons and scrap paper) is placed in
*Thc pcnchdnl for secrecy stimclimcs lakes on an air of liidicrousncss. Secret
medals Hrc uwardcd for outstanding pcrfiTrnHncc. but tficy cannot be worn or
shown outside the agency. Even athletic trophies — for intramural bowling.
Softball, and so on — cannot he displayed except within the guarded sanctuary
of the headquarters building.
The Clandestine Mentality-
233
these safes whenever an office is unoccupied. Security guards
patrol every part of the agency at roughly half-hour intervals
in the evening and on weekends to see that no secret docu-
ments have been left out. that no safes have been left
unlocked, and that no spies are lurking in the halls. If a
guard finds any classified material unsecured, both the per-
son who failed to put it away and the person within the
office who was assigned to double-check the premises have
security violations entered in their personnel files.
These security precautions all take place inside a headquar-
ters building that is surrounded by a twelve-foot fence topped
with barbed wire, patrolled by armed guards and police
dogs, and sealed off by a security check system that guaran-
tees that no one can enter either the outer perimeter or the
building itself without showing proper identification. Each
CIA employee is issued a laminated plastic badge with his
picture on it, and these must not only be presented to the
guards on entry, but be kept constantly in view within the
building. Around the edges of the badge are twenty or so
little boxes which may or may not be filled with red letters.
' Each letter signifies a special security clearance held by the
owner. Certain offices at the CIA are designated as restricted,
and only persons holding the proper clearance, as marked
on their badges, can gain entry. These areas are usually
guarded by an agency policeman sitting inside a glass cage,
from which he controls a turnstile that forbids passage to
unauthorized personnel. Particularly sensitive offices are
protected, in addition to the guarded turnstile, by a combina-
tion or cipher lock which must be opened by the individual
after the badge is inspected.
Even a charwoman at the CIA must gain security clear-
ance in order to qualify for the badge that she, too, must
wear at all times; then she must be accompanied by an
armed guard while she cleans offices (where all classified
material has presumably already been locked up). Some
rooms at the agency are considered so secret that the char-
woman and her guard must also be watched by someone
who works in the office.
The pervasive secrecy extends everywhere. Cards placed
on agency bulletin boards offering items for sale conclude:
"Call Bill, extension 6464." Neither clandestine nor overt
CIA employees are permitted to have their last names ex-
posed to the scrutiny of their colleagues, and it was only in
234
The CIA and the Cull of Inielligence
1973 that employees were allowed to answer their phones
with any words other than those signifying the four-digit
extension number.
Also until recent years all CIA personnel were required to
identify themselves to non-agency people as employees of
the State or Defense department or some other outside
organization. Now the analysts and technicians are permit-
ted to say they work for the agency, although they cannot
reveal their particular office. Clandestine Service employees
are easily spotted around Washington because they almost
always claim to be employed by Defense or State, but usu-
ally are extremely vague on the details and unable to furnish
an office address. They do sometimes give out a phone
number which corresponds to the correct exchange for their
cover organization, but these extensions, through some deft
wiring, ring in Langley.
The headquarters building, located on a partially wooded
12S-acre tract eight miles from downtown Washington, is a
modernistic fortress-like structure. Until the spring of 1973
one of the two roads leading into the secluded compound
was totally unmarked, and the other featured a sign identify-
ing the installation as the Bureau of Public Roads, which
maintains the Fairbanks Highway Research Station adjacent
to the agency.
Until 1%1 the CIA had been located in a score of buildings
scattered all over Washington. One of the principal justifica-
tions for the S46 million headquarters in the suburbs was that
considerable expense would be saved by moving all employ-
ees under one roof. But in keeping with the best-laid bureau-
cratic plans, the headquarters building, from the day it was
completed, proved too small for all the CIA's Washington
activities. The agency never vacated some of its old head-
quarters buildings hidden behind a naval medical facility on
23rd Street Northwest in Washington, and its National Photo
Interpretation Center shares part of the Navy's facilities in
Southeast Washington. Other large CIA offices located down-
town include the Domestic Operations Division, on Pennsyl-
vania Avenue near the White House.
And in Washington's Virginia suburbs there are even more
CIA buildings outside the headquarters complex. An agency
training facility is located in the Broyhill Building in Arlington,
and the CIA occupies considerable other office space in that
The Clandestine Menialiry
235
county's Rosslyn section. Also at least half a dozen CIA
components are located in the Tyson's Corner area of north-
ern Virginia, which has become something of a mini-
intelligence community for technical work due to the presence
there of numerous electronics and research companies that
do work for the agency and the Pentagon.
The rapid expansion of CIA office space in the last ten
years did not happen as a result of any appreciable increase
in personnel. Rather, the technological explosion, coupled
with inevitable bureaucratic lust for new frontiers, has been
the cause. As Director, Richard Melms paid little attention
to the diffusion of his agency until one day in 1968 when a
CIA official mentioned to him that still one more technical
component was moving to Tyson's Corner. For some reason
this aroused Helms' ire. and he ordered a study prepared to
find out just how much of the agency was located outside of
headquarters. The completed report told him what most
Washington-area real-estate agents already knew, that a sub-
stantial percentage of CIA employees had vacated the build-
ing originally justified to Congress as necessary to put all
personnel under one roof. Helms decreed that all future
moves would require his personal approval, but his action
slowed the exodus only temporarily.
When the CIA headquarters buildingwas being constructed
during the late 1950s, the subcontractor responsible for put-
ting in the heating and air-conditioning system asked the
agency how many people the structure was intended to
accommodate. For security reasons, the agency refused to
tell him, and he was forced to make his own estimate based
on the building's size. The resulting heating system worked
reasonably well, while the air-conditioning was quite uneven.
After initial complaints in I96I, the contractor installed an
individual thermostat in each office, but so many agency
employees were continually readjusting their thermostats that
the system got worse. The M&S Directorate then decreed
that the thermostats could no longer be used, and each one
was sealed up. However, the M&S experts had not consid-
ered that the CIA was a clandestine agency, and that many
of its personnel had taken a "locks and picks" course while
in training. Most of the thermostats were soon unlocked and
back in operation.
At this point the CIA took the subcontractor to court to
force him to make improvements. His defense was that he
236 The CIA and the Cull of Intelligence
had installed the best system he could without a clear indica-
tion of how many people would occupy the building. The
CIA could not counter this reasoning and lost the decision.
Another unusual feature of the CIA headquarters is the
cafeteria. It is partitioned into a secret and an open section,
the larger part being only for agency employees, who must
show their badges to the armed guards before entering, and
the smaller being for visitors as well as people who work at
the CIA. Although the only outsiders ever to enter the
small, dismal section are employees of other U.S. govern-
ment agencies, representatives of a few friendly governments,
and CIA families, the partition ensures that no visitor will
see the face of any clandestine operator eating lunch.
TTie CIA's "supergrades" (civilian equivalents of generals)
have their own private dining room in the executive suite,
however. There they are provided higher-quality food at
lower prices than in the cafeteria, served on fine china with
fresh linens by black waiters in immaculate white coats.
These waiters and the executive cooks are regular CIA
employees, in contrast to the cafeteria personnel, who work
for a contractor. On several occasions the Office of Manage-
ment and Budget has questioned the high cost of this private
dining room, but the agency has always been able to fend off
the attacks, as it fends off almost all attacks on its activities,
by citing "national security" reasons as the major justification.
Questions of social class and snobbery have always been
very important in the CIA. With its roots in the wartime
Office of Strategic Services (the letters OSS were said, only
half-jokingly, to stand for "Oh So Social"), the agency has
long been known for its concentration of Eastern Establish-
ment, Ivy League types. Allen Dulles, a former American
diplomat and Wall Street lawyer with impeccable connec-
tions and credentials, set the tone for an agency full of
Roosevelts, Bundys, Cleveland Amory's brother Robert, and
other scions of America's leading families. There have been
exceptions, to be sure, but most of the CIA's top leaders
have been white, Anglo-Saxon, Protestant, and graduates of
the right Eastern schools. While changing times and ideas
have diffused the influence of the Eastern ^lite throughout
the government as a whole, the CIA remains perhaps the
last bastion in official Washington of WASP power, or at
least the slowest to adopt the principle of equal opportunity.
The Clandes'.tne Mentality
237
It was no accident that former Clandestine Services chief
Richard Bissell (Groton. Yale, A.B.. Ph.D., London School
of Economics, A.B.) was talking to a Council on Foreign
Relations discussion group in 1968 when he made his "confi-
dential" speech on covert action. For the influential but
private Council, composed of several hundred of the country's
top political, military, business, and academic leaders, has
long been the CIA's principal "constituency" in the Ameri-
can public. When the agency has needed prominent citizens
to front for its proprietary companies or for other special
assistance, it has often turned to Council members. Bissell
knew that night in 1968 that he could talk freely and openly
about extremely sensitive subjects because he was among
"friends." His words leaked out not because of the indiscre-
tion of any of the participants, but because of student up-
heavals at Harvard in 1971.
It may well have been the sons of CFR members or CIA
officials who ransacked the office housing the minutes of
Bissell's speech, and therein lies the changing nature of the
CIA (and the Eastern Establishment, for that matter). Over
the last decade the attitudes of the young people, who in
earlier times would have followed their fathers or their fathers'
college roommates into the CIA, have changed drastically.
With the Vietnam war as a catalyst, the agency has become,
to a large extent, discredited in the traditional Eastern schools
and colleges. And consequently the CIA has been forced to
alter its recruiting base. No longer do Harvard, Yale,
Princeton, and a few other Eastern schools provide the bulk
of the agency's professional recruits, or even a substantial
number.
For the most part. Ivy Leaguers do not want to join the
agency, and the CIA now does its most fruitful recruiting at the
universities of middle America and in the armed forces.
While the shift unquestionably reflects increasing democrati-
zation in American government, the CIA made the change
not so much voluntarily as because it had no other choice if
it wished to fill its ranks. If the "old boy" network cannot be
replenished, some officials believe, it will be much more
difficult to enlist the aid of American corporations and gener-
ally to make use of influential "friends" in the private and
public sectors.
Despite the comparatively recent broadening of the CIA's
recruiting base, the agency is not now and has never been an
238
The CIA and the Cult of Intelligence
equal-opportunity employer. The agency has one of the small-
est percentages — if not ihe smallest — of blacks of any federal
department. The CIA's top management had this forcefully
called to their attention in 1967 when . a local civil-rights
activist wrote to the agency to complain about minority
hiring practices. A study was ordered at that time, and the
CIA's highest-ranking black was found to be a GS-13 (the
rough equivalent of an Army major). Altogether, there were
fewer than twenty blacks among Ihe CIA's approximately
12,000 non-clerical employees, and even the proportion of
black secretaries, clerks, and other non-professionals was
considerably below that of most Washington:area govern-
ment agencies. One might attribute this latter fact to the
agency's suburban location, but blacks were notably well
represented in the guard and char forces.
Top officials seemed surprised by the results of the 1967
study because they did not consider themselves prejudiced
men. Tttty ordered increased efforts to hire more blacks,
but these were not particularly successful. Young black col-
lege graduates in recent years have shied away from joining
the agency, some on political grounds and others because of
the promising opportunities available in the private sector.
Furthermore, the CIA recruiting system could not easily be
changed to bring in minorities. Most of the "spotting" of
potential employees is done by individual college professors
who are either friends or consultants of the agency, and they
are located on predominantly white campuses where each year
they hand-pick a few carefully selected students for the CIA.
The paucity of minority groups in the CIA goes well
beyond blacks, however. In 1964 the agency's Inspector Gen-
eral did a routine study of the Offlce of National Estimates
(ONE). The Inspector found no black, Jewish, or women
professionals, and only a few Catholics. ONE immediately
took steps to bring in minorities. One woman professional
was hired on a probationary basis, and one black secretary
was brought in. When the professional had finished her
probation, she was encouraged to find work elsewhere, and
the black secretary was given duties away from the main
ONE offices — out of sight in the reproduction center. ONE
did bend somewhat by hiring a few Jews and some addi-
tional Catholics.
There are extremely few women in high-ranking positions
in the CIA, but, of course, the agency does employ women
The Clandestine Mentality
239
as secretaries and for other non-professional duties. As is
true with all large organizations, there is a high turnover in
these jobs, and the agency each year hires a thousand or
more new applicants. In a search for suitable candidates,
CIA recruiters concentrate on recent high-school graduates
from the mostly white small towns and cities of Virginia and
the neighboring states. Maryland, West Virginia, and Penn-
sylvania. Washington, with its overwhelming black majority,
supplies comparatively few of the CIA's secretaries. Over
the years the recruiters have established good contacts with
high-school guidance counselors and principals in the nearby
states, and when they make their annual tour in search of
candidates, interested girls are steered their way, with sev-
eral from the same class often being hired at the same time.
When the new secretaries come to CIA headquarters outside
of Washington, they are encouraged to live in agency-selected
apartments in the Virginia suburbs, buildings in which virtu-
ally all the tenants are CIA employees.
Security considerations play a large part in the agency's
lack of attention to urban areas in its secretarial recruiting.
All agency employees must receive full security clearances
before they start work. This is a very expensive process, and
women from small towns are easier and cheaper to investigate.
Moreover, the CIA seems actually to prefer secretaries with
the Ail-American image who are less likely to have been
"corrupted" or "politicized" than their urbanized sisters.
Agency secretaries, as well as all other personnel, must
pass lie-detector tests as a condition of employment. Then
they periodically — usually at five-year intervals or when they
return from overseas assignments — must submit themselves
again to the "black box." The CIA, unlike most employers,
finds out nearly everything imaginable about the private
lives of its personnel through these polygraph tests. Ques-
tions about sex, drugs, and personal honesty are routinely
asked along with security-related matters such as possible
contacts with foreign agents. The younger secretaries invaria-
bly register a negative reading on the machine when asked
the standard: "Have you ever stolen government property?"
The polygraph experts usually have to add the qualifying
clause, "not including pens, pencils, or minor clerical items."
Once CIA recruits have passed their security investiga-
tions and lie-detector tests, they are given training by the
240
The CIA ami the Cult of Intelligence
agency. Most of the secretaries receive instruction in the
Washington area, such instruction focusing on the need for
secrecy in all aspects of the work. Women going overseas to
type and file for their CIA bosses are given short courses in
espionage tradecraft. A former secretary reported that the
most notable part of her field training in the late 1960s was to
trail an instructor in and out of Washington department
stores.'
The agency's professionals, most of them (until the 1%7
NSA disclosures) recruited through "friendly" college pro-
fessors, receive much more extensive instruction when they
enter the CIA as career trainees (CTs). For two years they
are on a probationary status, the first year in formal training
programs and the second with on-the-job instruction. The
CTs take introductory courses at a CIA facility, known as
the Broyhill Building, in Arlington, Virginia, in subjects
such as security, the organization of the agency and the rest
of the intelligence community, and the nature of interna-
tional communism. Allen Dulles, in his days as Director,
liked to talk to these classes and tell them how, as an
American diplomat in Switzerland during World War I, he
received a telephone call from a Russian late on a Saturday
morning. The Russian wanted to talk to a U.S. government
representative immediately, but Dulles had a date with a
young lady, so he declined the offer. The Russian turned out
to be Nikolai Lenin, and Dulles used the incident to urge the
young CTs always to be alert to the possible importance of
people they meet in their work.
Afterward. CTs go to "The Farm." the establishment near
Williamsburg that is disguised as a Pentagon research-and-
testing facility and indeed resembles a large military reser-
vation. Barracks, offices, classrooms, and an officers' club
are grouped around a central point. Scattered over its 480
mostly wooded acres are weapons ranges, jump towers, and
a simulated closed border of a mythical communist country.
Away from these facilities are heavily guarded and off-limits
sites, locations used for super-secret projects such as debrief-
ing a recent defector, planning a special operation, or train-
*This woman's training proved useful, however, when in her first post abroad,
ostensibly as an embassy secretary, she was given the mission of surveilling an
apartment building in disguise as an Arab woman.
The Clandestine Menialiiy
241
ing an important foreign agent who will be returning to his
native country to spy for the CIA.
As part of their formal clandestine training at "The Farm,"
the CTs are regularly shown Hollywood spy movies, and
after the performance they collectively criticize the tech-
niques used in the films. Other movies are also used, as
explained by the former clandestine operator who wrote
about his experience in the April 1967 Ramparts:
We were shown Agency-produced films depicting the
CIA in action, films which displayed a kind of Holly-
wood flair for the dramatic that is not uncommon inside
the Agency. A colleague who went through a 1963 train-
ing class told of a film on the U-2 episode. In his
comments prefatory to the film, his instructor intimated
that President Eisenhower "blew his cool" when he did
not continue to deny that the U-2 was a CIA aircraft.
But no matter, said the instructor, the U-2 was in sum
an Agency triumph, for the planes had been overflying
Soviet territory for at least five years. During this time
the Soviet leaders had fumed in frustration, unable to
bring down a U-2 on the one hand, and reluctant to let
the world -know of their inability on the other. The
photography contained in the film confirmed that the
"flying cameras" had accomplished a remarkable job of
reconnaissance. When the film ended and the lights
came on, the instructor gestured toward the back of the
room and announced: "Gentlemen, the hero of our
film." There stood Francis Gary Powers. The trainees
rose and applauded.
All the CTs receive some light-weapons training, and those
destined for paramilitary duties receive a full course which
includes instruction in explosives and demolition, parachute
jumps, air and sea operations, and artillery training. This
paramilitary training is also taken by the contract soldiers
(who greatly resent being called "mercenaries") who have
been separately recruited for special operations. They join the
CTs for some of the other courses but generally tend to avoid
the younger and less experienced recent college graduates who
make up the bulk of the CT ranks. Many of these mercenar-
ies and a few of the CTs continue on for an advanced course
242
The CIA and the Cull of Intelligence
in explosives and heavy weapons given at a CIA training
facility in North Carolina. Postgraduate training in paramilitary
operations is conducted at Fort Bragg in North Carolina and
at Fort Gulick in the Panama Canal Zone.
Fringe Benefits
Although agency personnel hold the same ratings and re-
ceive the same salaries as other government employees, they
do not fall under Civil Service jurisdiction. The Director has
the authority to hire or fire an employee without any regard
to normal governmental regulations, and there is no legal
appeal to his decisions. In general, however, it is the CIA's
practice to take extremely good care of the people who
remain loyal to the organization. There is a strong feeling
among agency management officials that they must concern
themselves with the welfare of all personnel, and this feeling
goes well beyond the normal employer-employee relation-
ship in the government or in private industry. To a certain
extent, security considerations dictate this attitude on the
part of management, since an unhappy or financially inse-
cure employee can become a potential target for a foreign
espionage agent. But there is more to it than that. Nearly
everyone seems to believe: We're all in this together and
anyone who's on the team should be taken care of decently.
The employees probably feel a higher loyalty to the CIA
than members of almost any other agency feel for their
organization. Again, this is good for security, but that makes
the sentiments no less real.
Some of the benefits for agency personnel are unique in
the federal bureaucracy. For example, the CIA operates a
summer intern program for college students. Unlike other
government agencies which have tried to hire disadvantaged
and minority youngsters, the CIA's program is only for the
sons and daughters of agency employees. Again the justifica-
tion is security and the expense of clearing outsiders, but it is
a somewhat dubious claim since the State Department man-
ages to clear all its interns for "top secret" without signifi-
cant expense or danger to security.
If a CIA employee dies, an agency security officer immedi-
ately goes to his or her house to see that everything is in
order for the survivors (and, not incidentally, to make sure
The Clandestine Mentality
243
no CIA documents have been taken home from the office).
If the individual has been living under a cover identity, the
security officer ensures that the cover does not fall apart
with the death. Often the security man will even help with
the funeral and burial arrangements.
For banking activities, CIA employees are encouraged to
use the agency's own credit union, which is located in the
headquarters building. The union is expert in giving loans to
clandestine operators under cover, whose personal-background
statements are by definition false. In the rare instance. when
an employee forfeits on a loan, the credit union seldom
prosecutes to get back the money: that could be a breach of
security. Tliere is also a special fund, supported by annual
contributions from agency officers, to help fellow employees
who accidentally get into financial trouble.
The credit union also makes various kinds of insurance
available to CIA employees. Since the agency does not wish
to give outsiders any biographical information on its personnel,
the CIA provides the insurer with none of that data that
insurance companies normally demand, except age and size
of policy. The agency certifies that all facts are true — even
that a particular employee has died — without offering any
proof. Blue Cross, which originally had the agency's health-
insurance policy, demanded too much information for the
agency's liking, and in the late 19S0s the CIA switched its
account to the more tolerant Mutual of Omaha. Agency
employees are even instructed not to use the airplane-crash
insurance machines available at airports, but to purchase
such insurance from the credit union.
Attempts are made even to regulate the extracurricular
activities of agency employees — to reinforce their attach-
ment to the organization and, of course, for security reasons.
An employee-activity association (incorporated for legal
purposes) sponsors programs in everything from sports and
art to slimnastics and karate. The association also runs a
recreational travel service, a sports and theater ticket service,
and a discount sales store. The CIA runs its own training
programs for reserve military officers, too. And it has ar-
ranged with local universities to have its own officers teach
college-level and graduate courses for credit to its employ-
ees in the security of its headquarters building.
The CIA can be engagingly paternal in other ways, too.
244
The CIA and the Cull of Intelligence
On the whole, it is quite tolerant of sexual dalliance among
its employees, as long as the relationships are heterosexual
and not with enemy spies. In fact, the CIA's medical office
in Suigon was known during the late 1960s for its no-questions-
asked cures of venereal disease, while State Department
officers in that city avoided the embassy clinic for the same
malady because they feared the consequences to their ca-
reers of having VD listed on their personnel records.
In many other ways the CIA keeps close watch over its
employees' health. If a CIA officer gets sick, he can go to an
agency doctor or a "cleared" outside physician. If he
undergoes surgery, he frequently is accompanied into the
operating room by a CIA security man who makes sure that
no secrets are revealed under sodium-pcntathol anesthesia.
If he has a mental breakdown, he is required to be treated
by an agency psychiatrist (or a cleared contact on the outside)
or, in an extreme case, to be admitted to a CIA-sanctioned
sanitarium. Although no statistics are available, mental break-
downs seem more common in the agency's tension-laden
atmosphere than in the population as a whole, and the CIA
tends to have a more tolerant attitude toward mental-health
problems and psychiatric therapy than the general public. In
the Clandestine Services, breakdowns are considered virtu-
ally normal work hazards, and employees are encouraged to
return to work after they have completed treatment. Usually
no stigma is attached to illness of (his type; in fact, a number
of senior officers suffered breakdowns while they were in the
Clandestine Services and it clearly did not hurt their careers.
Ex-Clandestine Services chief Frank Wisner had such an
illness, and he later returned to work as the CIA station
chief in London.
Many agency officials are known for their heavy drinking —
which also seems to be looked upon as an occupational
hazard. Again, the CIA is more sympathetic to drinking
problems than outside organizations. Drug use, however,
remains absolutely taboo.
While the personnel policies and benefits extended by the
CIA to its employees can be justified on the grounds of
national security and the need to develop organizational
loyalty, these tend to have something of a personal debilitat-
ing effect on the career officers. The agency is unconsciously
viewed as an omniscient, omnipotent institution — one that
The Clandestine Mentality
245
can even be considered infallible. Devotion to duty grows
to fantacism; questioning the decisions of the authorities is
tantamount to religious blasphemy. Such circumstances en-
courage bureaucratic insulation and introversion (especially
under strong pressures from the outside), and they even
promote a perverse, defensive attitude which restricts the
individual from keeping pace with significant social events
occurring in one's own nation — to say nothing of those evolv-
ing abroad. Instead of continuing to develop vision and
sensitivity with regard to their professional activities, the
career officers become unthinking bureaucrats concerned
only with their own comfort and security, which they achieve
by catering to the demands of the existing political and
institutional leaderships — those groups which can provide
the means for such personal ends.
Secret Writings
A number of years ago the CIA established a secret histori-
cal library, later a secret internal professional journal, and
ultimately began the preparation of the exhaustive secret
history of the agency, being written by retired senior officers.
The Historical Intelligence Collection, as the special li-
brary is officially known in the CIA, is a fascinating library
of spy literature, containing thousands of volumes, fiction
and non-fiction, in many languages. The curator, a senior
career officer by trade but by avocation a bibliophile of
some note, is annually allocated a handsome budget to travel
around the world in search of rare books and documents on
espionage. Through his efforts, the CIA today possesses
probably the most complete compilation of such publications
in the world. In recent years the collection has been ex-
panded to include intelligence memorabilia, featuring exhib-
its of invisible inks, bugs, cameras, and other equipment
actually used in certain operations by spies or their handlers.
The CIA's own quarterly trade journal is called Studies in
Intelligence. Articles in recent years have dealt with subjects
ranging from the practical to the theoretical: there have
been articles on how to react when undergoing enemy
interrogation; how the National Estimate process works;
how to covertly infiltrate and exfiltrate heavily guarded en-
emy borders. After the Cuban missile crisis the journal ran a
246
The CIA and the Cult of Intelligence
debate on whether the CIA had failed to detect the Soviet
missiles early enough or had succeeded in time to allow the
government to take remedial action.
Some articles are of pure historical interest. In 1970 there
was a fascinating account of the successful efforts at the end
of World War II of the couturier Count Emilio Pucci, then
in the Italian army, to keep out of German hands the diary
of Mussolini's Foreign Minister (and son-in-law) Count Ciano,
who had earlier been executed by the Duce. Presumably
stories of this kind would be of interest to ordinary citizens
but Studies in Intelligence, while bearing a physical resem-
blance to many regularly published magazines, is different in
one important respect. It is stamped secret and is therefore
available only to CIA employees and a few selected readers
elsewhere in the intelligence community. Even its regular
reviews of current spy novels are withheld from the Ameri-
can public.
The most important of the CIA's private literary projects
is the massive secret history of the agency that has been
in preparation since 1967. Recognizing the irresistible ten-
dency of former intelligence officers to write their memoirs
and, thereby, often to embarrass their organizations and
their government with their revelations, Director Helms
prudently agreed to permit the preparation of an official
secret history of the CIA and its clandestine activities. A
professor of history from a Midwestern university was
hired to act as coordinator and as a literary/research advisor
to those officers who would participate in the project.
Retired senior officials were rehired on contract at their
former salaries to spend a couple of additional years with
the agency pulling their recollections down on paper for
eventual incorporation in the encyclopedic summary of the
CIA's past.
Helms' decision was a master stroke. The history will
never be completed, nor will it ever be published. By defini-
tion it is a perpetual project and one that can be read
only by those who have a clear "need to know" — and they
are few indeed. But the writers, the battle-scarred old
hands, have gotten their frustrations out of their systems —
with no harm done — and they have been paid, well paid,
for their efforts. (Probably better than they could have been
had they gone public.) As for the CIA, it, too, is content
The Clandestine Mentality
247
with the arrangement; for it is its arrangement, a pact
made among friends and colleagues, one that conveniently
shuts out the primary enemy of those possessed of the
clandestine mentality — the public.
9.
INTELLIGENCE AND POLICY
Policy must be based on ihe best estimate of the
facts which can be put together. That estimate in
turn should be given by some agency which has no
axes to grind and which itself is not wedded to any
particular policy.
— ALLEN DULLES
Workmen had already started to put the White House Christ-
mas decorations in place on a December day in 1969 when
the President met in the Cabinet room with the National
Security Council. The purpose of the session was to decide
what American policy should be toward the governments of
southern Africa, Ever since Henry Kissinger had sent a Na-
tional Security Study Memorandum (NSC 39) out to the
interested parts of the federal government the previous April,
bureaucrats had been writing position papers to prepare
their chiefs for this meeting. There was sharp disagreement
within the government on how hard a line the United States
should take with the white-minority regimes of South Africa,
Rhodesia, and the Portuguese colonies in Africa. Now the
time for decision-making was at hand, and those present
included the Vice President, the secretaries of State and
Defense, the under secretaries of State and Commerce, the
Director of Central Intelligence, a representative of the Na-
tional Aeronautics and Space Administration (NASA), the
Assistant to the President for National Security Affairs, and
the Chairman of the Joint Chiefs of Staff.*
The President opened the session by stating that the
NSC had before it some very complex problems — complex
not only in the usual foreign-policy sense but also in
'Admiral Thomas Moorcr. the newly named Chairman of Ihe JCS, was
attending his first NSC meeting in this capacity. The President noted the
occasion by introducing him to all assembled as "Admiral Mormon."
Intelligence and Policy
249
a moral context which, the President noted, concerned a
large portion of the American population. Nixon then
turned to his DCI, Richard Helms, and said, "Go ahead,
Dick."
The NSC meeting had officially begun, and, as was
customary. Helms set the scene by giving a detailed briefing
on the political and economic background of the countries
under discussion. Using charts and maps carried in by an
aide, he described recent developments in southern Africa.
(His otherwise flawless performance was marred only by his
mispronunciation of "Malagasy" Iformerly Madagascar), when
referring to the young republic.)
Next, Henry Kissinger talked about the kind of general
posture the United States could maintain toward the white
regimes and outlined the specific policy options open to the
President. In the case of South Africa, the two operational
questions were whether to allow visits by U.S. Navy ships
(which were eventually turned down) and whether to close
that country's American space tracking facilities at which
apartheid, or racial segregation, was practiced (they were
permitted to slay open at the strong urging of NASA). For the
Portuguese colonies, the problems were whether to grant
Export-Import Bank credits (these were largely approved) and
whether to continue the embargo on the shipment of U.S. arms
(which the CIA itself had violated four years before in helping
to transport American B-26 bombers to Portugal. This time,
the President decided not to lift the embargo.)
Kissinger continued, stating that the two questions concern-
ing Rhodesia were whether to make an exception to the then
existing ban on the importation of Rhodesian chrome for the
benefit of Union Carbide which claimed to have paid for a
large quantity before the embargo had gone into effect (the
President later approved this exception) and whether to close
the American consulate in the Rhodesian capital of Salisbury.
This last matter was quite important since Rhodesia had in
1965 unilaterally declared its independence from Great Brit-
ain and earlier in 1969 had broken all constitutional ties by
declaring itself a republic. The continuing presence of the U.S.
consulate under these circumstances provided some measure
of recognition to the rebel government while being a source of
criticism in the United Nations and among liberal and black
Americans.
250 The CIA and the Cull of Intelligence
The various NSC members gave their department's point of
view about the different problems.' . . . the United States
to do so. To what extent Helms' arguments played a part
in the presidential decision can be answered only by Richard
Nixon himself. But, the following year, at the request of
the British, the United States did end its
10 LINES DELETED
was such an established factor that it was not even under
review at the NSC meeting.
It was quite extraordinary for Helms to speak out to the
NSC about the detrimental effect his agency would suffer
if the ( DELETED ) since
the DCI's normal role at these 'sessions is limited to provid-
ing the introductory background briefing. As the President's
principal intelligence advisor, his function is to supply the
facts and the intelligence community's best estimate of fu-
ture events in order to help the decision-makers in their
work. What Helms was saying to the NSC was entirely
factual, but it had the effect of injecting intelligence opera-
tions into a policy decision. In theory at least, the decision-
makers are supposed to be able to choose the most ad-
vantageous options with the benefit of intelligence — not for
the benefit of intelligence.
Analysis v. Operations
Many, but by no means all, intelligence professionals agree
that the primary and, indeed, paramount purpose of the
intelligence process is to produce meaningful, timely informa-
tion on foreign developments after a careful analysis of
secret and open sources. The finished product should be
*Soine of the slatemenls were quite revealing. Early in the meeting Secrrtar^f
of State William Rogers jokingly pointed out. to general laughter in the room,
that it might be inappropriate for the group to discuss the subject at hand,
since some of those present had represented southern African clients in
earlier law practices. Vice President Spiro Agnew gave an impassioned speech
on how the South Africans, now that they had recently declared their
independence, were not about to be pushed around, and he went on to
compare South Africa to the United Stales in its infant days. Finally, the
President leaned over to Agnew and said gently, "You mean Rhodesia, don't
you. Ted?"
Intelligence and Policy
251
balanced in perspective and objective in presentation. Under
no circumstances is intelligence supposed to advise a particu-
lar course of action. The intelligence function, when prop-
erly performed, is strictly an informational service.
This is the theory, but in actual practice the U.S. intelli-
gence community has deeply intruded — and continues to —
into the policy-making arena. Perhaps it is unrealistic to
expect that a $6 billion activity with more than 150,000 em-
ployees working in over 100 countries would do otherwise.
Nevertheless, it should be understood that when someone
like Richard Helms publicly declares, as he did in 1971, "We
make no foreign policy," he may be technically correct in
the sense that CIA officials must receive approval from the
White House for their main programs; but he is absolutely
incorrect in leaving the impression that the intelligence
community, apart from supplying information, does not have
a profound determinative effect on the formulation and car-
rying out of American foreign policy.
The very existence of the CIA as an instrument for secret
intervention in other countries' internal affairs changes the
way the nation's highest leaders look at the world. They
know that if open political or economic initiatives fail, they
can call on the CIA to bail them out. One suspects that the
Eisenhower administration might have made more of an
effort during its last ten months to prevent relations with
Cuba from reaching the breaking point if the President had
not already given his approval to the clandestine training of
a refugee army to overthrow the Castro regime.
The extreme secrecy in which the CIA works increases the
chances that a President will call it into action. He does not
have to justify the agency's activities to Congress, the press,
or the American people, so, barring premature disclosure,
there is no institutional force within the United States to
stop him from doing what he wants. Furthermore, the se-
crecy of CIA operations allows a President to authorize
actions in other countries which, if conducted openly, would
brand the United States as an outlaw nation. International
law and the United Nations charter clearly prohibit one
country from interfering in the internal affairs of another,
but if the interference is done by a clandestine agency
whose operations cannot readily be traced back to the United
States, then a President has a much freer hand. He does not
even have to worry about adverse public reaction at home or
252
The CIA and the Cull of Intelligence
abroad. For example, after Salvador Allende had been elected
President of Chile in 1970, President Nixon was asked at a
press conference why the United States was willing to inter-
vene militarily in Vietnam to prevent a communist takeover
but would not do the same thing in Chile to prevent a
Marxist from taking power; he replied that "for the United
States to have intervened in a free election and to have
turned it around, I think, would have had repercussions all
around Latin America that would have been far worse than
what happened in Chile." The President failed to mention
that he had approved CIA covert action programs costing
$400,000 to stop Allende, but by keeping his action secret, he
was able to avoid — at least for the time being — the "adverse
political reaction" which he feared. If there had been no
CIA to do the job covertly, the U.S. government almost
certainly would not have tried to involve itself in the Chilean
elections, since it was obviously not willing to own up to its
actions.
Clandestine operations can appear to a President as a
panacea, as a way of pulling the chestnuts out of the fire
without going through all the effort and aggravation of tortu-
ous diplomatic negotiations. And if the CIA is somehow
caught in the act, the "deniability" of these operations, in
theory, saves a President from taking any responsibility — or
blame. Additionally, the CIA is equipped to act quickly in a
crisis. It is not hindered nearly as much by a cumbersome
bureaucracy as is the Pentagon, and it has proved its ability
to move with little advance notice, as it did in the Congo
during the early 1960s, to put an "instant air force" into
action. And the agency's field personnel do not demand the
support facilities of their military colleagues. In Laos forty
or fifty career CIA officers assisted by several hundred
contractees ran an entire "secret war," whereas the Pentagon,
given the same mission, probably would have set up a military-
assistance command with thousands of personnel (as it did in
Vietnam), at a much greater cost to the United States. Also,
CIA operators are much less likely than the military to
grouse publicly that political restrictions are forcing them to
fight "with one arm tied behind our back," and this makes
the agency attractive to a President who has no desire to
engage in a running battle with his generals over the tactics
to be used in a particular situation.
Intelligence and Policy
253
The CIA does not originate an American commitment to
a country. The President and the State Department do that.
But once CIA operations are started in a foreign land, the
U.S. stake in that nation's future increases. Certainly the
American interest would be even larger if the President
decided to send in combat troops instead of his covert warriors,
but such open intervention would h<^ve to be justiTied publicly.
In the 1950s and early 1960s neither President Eisenhower nor
President Kennedy wanted to make such a commitment in
Vietnam or Laos. Yet, by using foreign aid funds and heavy
doses of covert operations, they were able to create and then
keep alive anti-communist governments in both countries.
When these palliatives proved insufficient later in the 1960s,
President Johnson chose to send American ground troops
into Vietnam iind to begin the systematic bombing of Laos
by the U.S. Air Force. It might be argued that the CIA's
covert operations put off the day when more massive amounts
of American power would be needed, but it also might be said
that if the agency had not managed to keep the governments
in Saigon and Vientiane functioning for such a long time,
the United States would never have intervened openly at all.
In neither Vietnam nor Laos was the CIA acting without
the approval of the nation's highest policy-makers. Indeed,
all the agency's major covert-action operations are approved
by the 40 Committee, and the President himself closely re-
views this committee's decisions. But even approved clandes-
tine activities have a way of taking on a life of their own, as
field operatives loosely interpret the general guidelines that
comedown from the White House through Langley. By not
closely supervising CIA covert operations, the nation's high-
est leaders have allowed the agency to affect foreign policy
profoundly. For example, during the CIA revolt against the
leftist Guatemalan regime in 1954, an agency plane bombed a
British freighter which was suspected of carrying arms to the
embattled government troops. In fact the ship was loaded
with coffee and cotton, and, fortunately, no one was injured
when only one of the bombs exploded. Richard Bissell admit-
ted to the New York Times on April 28, 1966, that the attack
on the British vessel was a "sub-incident" that "went beyond
the established limits of policy." Bissell continued, "You
can't take on operations of this scope, draw boundaries of
policy around them and be absolutely sure that those bound-
aries will not be overstenned."
254
The CIA and the Cull of Intelligence
The CIA got involved in another "sub-incident" while it
was training Cuban exiles at secret bases in Guatemala for
an invasion of their homeland. In November 1960 a rebellion
broke out against the Guatemalan government which had
been so gracious in allowing the agency to use its territory as
the jumping-off point for the Cuban operation. The CIA
returned the favor by sending its B-26 bombers to help crush
the insurgency. It is not clear whether White House permis-
sion was given for these attacks, but there was no question
that the CIA had again interfered in Guatemalan internal
politics — this time to make sure that no new Guatemalan
government would oust it from its secret bases. Once
embarked on the attempt to overthrow Castro, the agency
had become involved in a chain of events which forced it to
intervene militarily in a second country to protect its opera-
tion against Cuba. The President may have set the original
policy, but there was no way he could have known that
Mmply by approving an attack on Cuba he would set in
motion agency paramilitary activities against Guatemala.
CIA operations can have another unforeseen effect on
American foreign policy: they can subject the country to
blackmail if something goes wrong. For instance, within five
days after the CIA pilot was shot down and captured by
Indonesia in 1958. the U.S. government approved the sale for
local currency of 37,000 tons of American rice and lifted an
embargo on Si million in small arms and other military
equipment. Considering that at that moment the CIA was
actively backing an aimed revolution against the Sukarno
regime, these would have been strange actions indeed for the
U.S. government to take if it were not extremely concerned
about saving the captured pilot.
A somewhat similar incident occurred in Singapore in 1960
after a CIA lie-detector expert was flown into the city to
make sure that a locally recruited agent was trustworthy.
When the agency technician plugged in his polygraph ma-
chine in a hotel room, he blew out all the fuses in the
building. ' The lie-detector man, a CIA case officer, and the
local agent were soon under arrest. The Singapore govern-
• This was not the only time that the CIA blew major fuses overseas. During . . .
the Agency added to its . . . facilities on Taiwan by building a . . installation
for . . When the device was turned on for the first time, it knocked out a targe
part of the island's power. In this case, the local government reacted in a much
more friendly manner than did Singapore's. . . .
Intelligence and Policy
255
ment and the British, who were in the process of granting
Singapore its independence, were both disturbed by the
incident. Negotiations then ensued to secure the men's release.
According to Singapore Prime Minister Lee Kuan Yew, the
U.S. government offered $3.3 million to get them out. Lee
claimed that he wanted ten times as much and consequently
took nothing. In any case, the two CIA officials were subse-
quently freed, and the newly installed Secretary of State, Dean
Rusk, wrote a secret letter of apology to the Singapore leader.
In a 1965 speech Lee mentioned the affair as an example of
the type of activity engaged in by the CIA. The State Depart-
ment issued a routine denial furnished by the CIA — State's
press office not realizing the truth of Lee's charges. Lee
reacted by publicly producing Rusk's le.tter of apology, and
State was forced to retract its original statement, although it
still maintained that no ransom had ever been offered. As well
as embarrassing the U.S. government and making headlines
around the world, the incident caused the State Department
to revamp its internal system for making announcements
about intelligence matters. The CIA had a major interest in
the matter, since it operated a Foreign Broadcast Information
Service (FBIS) listening post there, (DELETED)
In general the presence of American intelligence facilities
in a foreign country can have an important effect on Ameri-
can policy toward that country, especially in the Third World.
Closely aligned countries, such as
4 LINES DELETED
But to the less developed countries, the presence of an
American installation is both a threat and an opportunity.
The threat comes from domestic opposition forces who look
on the base as an example of "neo-colonialism" and use it as
a weapon against those in power. The opportunity arises out
of the fact that the United States will pay dearly for the right
to install its eavesdropping equipment and keep it in place — as
( DELETED ) discovered.
3Vi LINES DELETED
Both host governments have been severely criticized by inter-
nal forces and neighboring countries for giving the United
States a foothold in their nations, but both have been hand-
256
The CIA and the Cull of Intelligence
somely rewarded in American military and economic assis-
tance well into the hundreds of millions of dollars. While
comparatively modest amounts of aid would probably have
been supplied even if there had been no bases, the large size
of the programs represented, in effect, a direct payment for
the intelligence facilities.
Similarly, from 1956 until the end of 1969 the U.S. Air
Force operated a huge base near Peshawar in Pakistan which
was primarily an intelligence facility. For several years be-
fore Francis Gary Powers' abortive flight over the Soviet
Union in 1960, the CIA's U-2 planes used Peshawar as a
principal takeoff point for reconnaissance flights over and
along the edges of the Soviet Union, In addition,
3 LINES DELETED
From the early days of the Eisenhower administration, the
United States had allied itself more closely with Pakistan
than with India in those two countries' continuing struggle.
Yet at least some experts on the region believe that an
important factor in the American "tilt" toward Pakistan, at
least until the late 1960s, was the desire to hold on to the
base at Peshawar.
Another site of large American technical espionage instal-
lations is the island of Taiwan. In this instance the United
States did not have to provide the Nationalist Chinese gov-
ernment with much inducement to allow the construction of
the facilities, since they were aimed against the Nationalists'
archenemy on the mainland and some of the information
gathered was shared with the Chiang Kai-shek government.
Furthermore, in the fifteen or so years after the Nationalists'
expulsion from China, the CIA closely cooperated with
Chiang's intelligence service to run covert missions against
the mainland, and the Nationalists were so dependent on the
United States for their very existence that they were in no
position to extract a large payment from the United States
for the intelligence bases. Yet, by giving the CIA and the
other agencies a free hand to build virtually any kind of
facility they chose, the Chiang government made it much
more difficult for the United States to disengage from Tai-
wan and build better relations with China. Many of the most
important installations for the surveillance of the mainland
are located on the island, and they represent an investment
Intelligence and Policy
257
valued in the hundreds of millions of dollars. All American
military forces, including those engaged in intelligence work,
will have to be removed from Taiwan before the United
States meets the Chinese conditions for complete normaliza-
tion of relations between the two countries.
Recent history is full of other examples of technical espio-
nage programs having a profound effect on U.S. foreign
policy. TTie shoot-down of the U-2 over the Soviet Union in
1960 caused the cancellation of the Eisenhower-Khrushchev
summit meeting. The spy ship Liberty, while trying to moni-
tor the action during the 1967 Six Day War, moved in too
close (because a "warning" message from Washington was
misrouted) and was shot up by Israeli planes and boats.
Thirty-four Americans were killed As a result, according to
former DIA and CIA staffer Patrick McGarvey in his book
CIA: The Myth and the Madness, the Joint Chiefs of Staff
"proposed a quick, retaliatory air strike on the Israeli naval
base which launched the attack." TTie Chiefs' recommenda-
tion was turned down. McGarvey continues:
The next year the North Koreans seized a similar ship,
the Pueblo, and interned its crew. Again we were on
the brink of war because of intelligence, the supposed
secret arm of government. The JCS again recommended
an air strike. The Pueblo incident was followed by the
shoot-down of a United States reconnaissance plane [a
Navy EC-121] off the coast of North Korea a little over a
year later. And again JCS wanted to mount an air strike.
There have been other disastrous reconnaissance flights —
those over China — that have gone virtually unreported in the
American press. Some of these have been mentioned by the
New China News Agency, but have apparently been dis-
missed in the West as communist propaganda. They include
the shooting down of several CIA U-2 planes flown by
Nationalist pilots and even more U.S. Air Force pilotless
"drone" aircraft (the Chinese claim nineteen downed be-
tween 1964 and 1969) over the Chinese mainland. American
SR-71s also flew regularly over China (and continue to do so
over North Korea) until all reconnaissance flights were stopped
as a result of Henry Kissinger's first trip to Peking in 1971.
At the very time in October 1969 when the United States
was trying to resume diplomatic contact with the Chinese,
258
The CIA and the Cull of liUflligence
Air Force Intelligence, with Ihc approval of die 40 Commiltee,
sent a drone over southern China. On October 28 the New
China News Agency reported the downing of "a U.S.
imperialist, pilotless. high altitude plane," but
7 LINES DELETED
Another extremely provocative drone flight was proposed
by the Pentagon in the period after the American invasion of
Cambodia in 1970. The mission was approved by the 40
Commitlee over the iitrong objections of tiic State Department
which estimated that roughly one in three of these aircraft
would be shot down.
12 LINES DELETED
The official justification for all the espionage missions
carried out by intelligence planes and ships is to gather
intelligence which helps to protect the national security of
the United States. But with literally hundreds of flights and
cruises scheduled each month along the borders of and over
unfriendly countries, inevitably there are embarrassing failures.
That these abortive missions on occasion cause international
crises is understood by the policy-makers who rather rou-
tinely give their approval, and is presumably figured in as
one of the costs of acquiring the intelligence. Yet it is fright-
ening to realize that some of these spying forays could have
led — and could in the future lead — to armed conflict. Mis-
sions that violate the territorial integrity of foreign countries
are clear violations of sovereignty, and any country that
shoots at an intruder inside its borders is completely within
its legal rights.
While Allen Dulles professed to believe that U.S. foreign
policy should be based on intelligence estimates developed
by an agency with "no axes to grind and . . . itself . . . not
wedded to any particular policy," his actions were not al-
ways true to these words. Consequently, he made possible the
Bay of Pigs — the classic case of what can happen when intelli-
gence is misused in the carrying out of a clandestine operation.
The problem started on the eve of Fidel Castro's trium-
phant march into Havana in January 1959 while CIA analysts
were preparing a report for the White House stating that the
Intelligence and Policy
259
rebels' success was due largely to the corruption of the
Batista regime and the resulting popular disgust among the
Cuban people. Allen Dulles personally intervened in the
intelligence process and rewrote this report to suit his own
political biases. In Dulles' view, Castro's victory was not a
natural development that could have been expected in light
of the faults of Batista. Dulles' Calvinistic mind may well
have seen the hand of the Devil at work, and he predicted
that there would be a slaughter in Havana which would put
the French Revolution to shame. "Blood will flow in the
streets," he wrote passionately in the CIA report to the
White House.
For the most part, however, the agency's analysts took a
more moderate tone in the months that followed. TTiey
stressed that Castro's Cuba, while something of an annoyance,
was in no way a direct threat to the security of the United
States. l~he Intelligence Directorate also tried to explain that
Castro, despite his socialistic leanings, was Fiercely indepen-
dent and a devout nationalist, much like Indonesia's Sukarno,
Egypt's Nasser, and Ghana's Nkrumah — all opponents of
Western domination of the Third World but certainly not
agents of any international communist conspiracy. Most im-
portant for future events, the analysts wrote that, regardless
of the emotional reports flowing from Cuban refugees con-
cerning political unrest on the island, Castro appeared to
have the general support of the populace.
Dulles did not accept this finding of his intelligence analysts,
nor did he promote their point of view at the White House.
Instead, he seized upon the reporting of the Clandestine
Services as more truly reflective of events in Cuba. Dulles
had always believed that the field operator was a more
reliable judge of events than the intelligence analyst back at
headquarters. Prior to Castro's takeover, there had not even
been a full-time CIA analyst of Cuban problems in the
Intelligence Directorate, and the two that were added after
January 1959 never really won Dulles' trust. He preferred to
read the assessments of the Clandestine Services' officers,
who did their own evaluation of the clandestine reports
received from secret agents.
Sometime during late 1959 Dulles decided that the best
solution for the Cuban problem would be to invade Cuba
with an army of Cuban refugees and to overthrow Castro.
He was unquestionably influenced by the reports of the
260 The CIA and the Cult of Intelligence
Clandestine Services, which, unlike those of the Intelligence
Directorate, stressed the unpopularity of the Castro regime,
its internal frictions, and its economic troubles. In March
1960, President Eisenhower, at Dulles' urging and with Dulles'
facts at hand, gave his approval for the CIA to start recruit-
ing and training the ill-fated invasion force. Robert Amory,
the Deputy Director of Intelligence, was never officially told
that the invasion was in the works so that his experts could
analyze the chances of success. Dulles was convinced that
Cuba was ripe for an invasion, and as he was the President's
chief intelligence advisor, that was that.
When the CIA's military force failed to topple Castro in
the spring of 1961, the agency's Intelligence Directorate tem-
porarily gained equal footing with the Clandestine Services.
This did not occur because there was any newfound apprecia-
tion of the analysts' work but rather because the operators
were in a general state of disgrace after the Bay of Pigs.
John McCone took over as Director in November 1961, and
after rising above his initial distrust of the entire organization,
he ultimately saw the need for and the value of high-quality
national intelligence.
Severtheless, the Clandestine Services, having consolidated
their anti-Castro operations into a Cuban Task Force combin-
ing paramilitary, covert action, propaganda, and espionage
activities in one office, continued secretly to attack the Ha-
vana regime, using, as in the past, commando teams made up
of Cuban refugees.* Castro, whose secret agents had pene-
trated the CIA's operations long before the Bay of Pigs,
knew perfectly well what the CIA was doing, and the ongo-
'Assassinatinn of Casirn seemed lo have been a recurrent idea in Ihc CIA
during ihcsc year^. E. Howard Hum claims lo have recommended it before
the Bay of Pigs, only to be turned down in November President
Kennedy mentioned the idea in a private chat «'iih Tad Szulc. then of the
Ne*' York Times. Kennedy asked the newsman, "How would you feel if the
United Slates assassinated Castro?" When Szulc said he thought it was a very
poor idea. Kennedy said. "I'm glad you feel thai way because suggestions lo
thai effect keep coming lo me. and I believe very sirongly the United Stales
should not he a party lo political assassination." Lyndon Johnson lold his
former aide Leo }anm, as recounted in a July 1973 Allamic arlicle. "We had
been operating a damned Murder. Inc in the Caribbean." Janos elaborated.
"A year or so before Kennedy's death a CIA-backed assassination team had
been picked up in Havana. Johnson speculated thai Dallas had been a retaliation
for this thwarted attempt, although he couldn't prove it."
Intelligence and Policy
261
ing American attacks against his rule may well have been an
important factor in his decision in the spring of 1%2 to allow
the Soviet Union to install offensive nuclear weapons in his
country.
The Cuban missile crisis that developed as a result pro-
duced one of the finest hours for the CIA and the intelli-
gence community, although the last National Intelligence
Estimate, prepared by the CIA a little over a month before
President Kennedy went on nationwide television to an-
nounce the Cuban "quarantine," declared that it was un-
likely that the Soviets would install nuclear-tipped missiles
on the island. The fact remains, however, that the CIA and
the other intelligence agencies did discover the Soviet mis-
siles in time for the President to take action, and they
presented the facts to Kennedy with no policy recommenda-
tions or slanting which could have limited his options. This
was how the intelligence process was supposed to work.
The affair started in the late spring of 1962 when CIA
analysts noted that the Soviets were sending an increased
amount of military assistance to Cuba. These shipments
were not viewed with particular alarm in the agency, since
there was still much to be done in the Soviet re-equipping of
the Cuban army forces, which was then under way. Further-
more, the CIA had ways of keeping track of what arms
flowed into Cuba.
Since January 1961, when the Eisenhower administration
had broken diplomatic relations with the Castro regime,
there had been no agency operators working out of an
American embassy in Havana, but the
5 LINES DELETED
Additionally, a steady flow of refugees was arriving in Mi-
ami and being debriefed by agency officers permanently
assigned there. As was true before the Bay of Pigs, the
stories told by many of these refugees were hysterical but
occasionally some valuable nugget of information would be
gleaned from their tales.
Based on President Kennedy's request, the USIB had set
Cuba as a Priority National Intelligence Objective (PNIO),
and the various military intelligence agencies had been as-
signed extensive collection requirements by the USIB. New
requirements were almost continually levied in response to
262
The CIA and the Cult of Intelligence
the specific needs of the analysts. The Air Force and the
Navy carefully watched the shipping lanes and photographed
Soviet ships destined for Cuba. Surveillance was provided by
the Sixth Fleet in the Mediterranean, by the Atlantic fleet
(which even had a listening post at Guantanamo Bay inside
Cuba), and by the Air Force. U.S. intelligence photographed
ship movements and listened in electronically on Cuban
communications. TTie National Security Agency tuned its
huge antennae in on Soviet shipping and Cuban communi-
cations. ITT had operated much of the Cuban communica-
tions system before Castro's nationalizations, and the com-
pany worked closely with the CIA and NSA to intercept
messages. Much of the old equipment was still in use, and
the NSA was collecting large amounts of information. Finally,
the CIA was flying two U-2 missions each month over Cuba,
and the photographs taken by these spy planes were quickly
turned over to the analysts.
So while Soviet military (and economic) assistance to Cas-
tro was on the upswing in the late spring of 1962, there
seemed little cause for alarm in the CIA or elsewhere in the
U.S. government. Moscow had recently eased tensions in
Berlin, much to the relief of Washington policy-makers,
whose strong stand in that divided city appeared to have
paid off. But still there were a few ominous signs. The CIA
leanicd that Soviet mflilary penMMinel were being secretly used
in combat roles as submarine crews in Indonesia and as
bomber crews in Yemen, a drastic departure from previous
Soviet practice. Then, by July the analysts noted further
increases in the arms being shipped to Cuba, along with the
arrival of a large number of young men from the Soviet
Union — who Moscow claimed were technical advisors to
assist in economic development programs. TTie CIA doubted
this, for, among other reasons, all the "civilians" were young,
seemed to have a military bearing, and wore only two kinds
of sport shirt. It was becoming clear that the Soviets were
supplying too much military equipment for the Cuban armed
forces to absorb. A small group of CIA analysts, expert in
deciphering the ways Moscow and its allies conducted their
foreign aid programs, became convinced that an unprece-
dented military build-up was occurring in Cuba. Their ef-
forts during August to alert top U.S. officials to this threat
were hampered, surprisingly, by military intelligence agencies,
namely the DIA and the NSA, which viewed the intensified
Intelligence and Policy
263
Soviet activity on the island as mostly economic assistance.
Perhaps it was because the CIA had performed so poorly
with its inaccurate reporting on Cuba as a prelude to the Bay
of Pigs that even the hawkish U.S. military establishment
was now leery of the agency's ability to assess the Cuban
situation. In any event, both the DIA and the NSA saw fit
to counter the CIA intelligence reports with rebuttals in late
August 1962.
The basic reason that the CIA analysts were able to moni-
tor the Soviet arms build-up more closely than the other
intelligence agencies, which had essentially the same informa-
tion available, was the more refined technique that the CIA
had developed, including a special analytical tool known as
"crate-ology" — a unique method of determining the con-
tents of the large crates carried on the decks of the Soviet
ships delivering arms. With a high degree of accuracy, the
sp>ecialists could look at photographs of these boxes, factor
in information about the ship's embarkation point and So-
viet military production schedules, and deduce whether the
crates contained transport aircraft or jet fighters. While the
system was viewed with caution by many in the intelligence
community, CIA director John McCone accepted its findings,
and his confidence in the technique proved to be justified.
Nevertheless, the CIA's analysts did not spot the first
shipments of Soviet offensive missiles, which arrived in Cuba
during the early part of September. The Soviets escaped the
scrutiny of the "crate-ologists" by sending the weapons in
the holds of huge freighters, not in crates carried on deck as
had been their usual practice when delivering bulky military
equipment. On September 19, the USIB approved the National
Intelligence Estimates which, while noting the disturbing
Soviet arms build-up, declared it unlikely that the Russians
would bring in nuclear-tipped missiles. During this period
McCone personally suspected the worst of the Soviets, but,
to his credit, he did not put his private views forward as
the CIA position since, as he would later say, it was based
on "intuition," not "hard intelligence." Nevertheless, he
did urge the White House to approve an increased schedule
of U-2 flights. The President agreed in early October,
but, at Defense Secretary McNamara's urging, responsibility
for the reconnaissance missions was turned over from the
CIA to the Air Force because of the danger that Soviet
264
The CIA and the Cull of Inielligence
SAMs (surface-to-air missiles) posed to more frequent
flights.*
On October 14 an Air Force U-2 brought back photo-
graphs of six medium-range ballistic-missile sites which were
nearing operational readiness and four intermediate range
sites in the early stages of construction. CIA analysts were
able to verify these pictures indisputably with the help of
information previously provided by satellite surveillance of
similar installations in the U.S.S.R. and from documents
supplied by Penkovsky, and also by comparing the
3 LINES DELETED
And thus the Cuban missile crisis began.
By the end of October, Nikita Khrushchev had been
outmaneuvered by Kennedy and he promised to withdraw
his country's offensive weapons from Cuba, in return for an
American pledge not to invade the island. (This was a pledge
that the CIA, with White House approval, seems to have
violated systematically by continuing its guerrilla raids on
Cuba until the late 1960s.) Tlie CIA and several military
intelligence agencies maintained their surveillance of .Cuba
to make sure the withdrawal was complete. It was, despite
persistent rumors in the press that the Soviets had hidden
some of the missiles in caves. The CIA even noted that a
group of IL-28 jet bombers had been removed from a hiding
place which the agency had (unknown to the Soviets) pre-
viously discovered.
President Kennedy chose later to view the missile crisis as
a nearly disastrous intelligence failure, since the CIA had
been unable to give early warning of the Soviet offensive
build-up and had predicted in its last estimate the unlikelihood
of Soviet missiles being placed on the island. He was not
willing to concede that the agency's warning of heavily in-
creased Soviet military activity on the island during the
summer months (when military intelligence was claiming
otherwise) compensated for the CIA's inability to predict
*Jusi as Ihe new wave ol U-2s was siarling surveillance of Cuba, on
October 9, 1962, the mainland Chinese used a SAM lo bring down a CIA
U-2 flown by a Nationalist Chinese pilot. A SAM of the same model had
knocked Francis Gary Powers out of the air over the Soviet Union two
years earlier and would down an Air Force plane over Cuba late in October i'
at Ihe height of the missile crisis.
Inielligence and Policy
265
that nuclear-missile sites would be constructed — even though
it was as a direct result of the agency's warning that surveil-
lance of the island was intensified and ultimately led to the
discovery of the missiles. To what extent the President still
mistrusted the CIA for its Bay of Pigs blunder is unclear, but
Kennedy obviously expected better information.
The Cuban missile crisis illustrated the inherent limita-
tions of intelligence, among the most important of which
is that certain events simply cannot be predicted with accu-
racy or confidence. Khrushchev's decision to install nuclear
missiles in Cuba was not knowable until the Soviets had
actually embarked on that course of action. Careful psycho-
logical studies of Khrushchev's character could provide sup-
positions that he might act in an unpredictable way, but to
have known exactly what he would do would have required
divine analytical wisdom or spies in the inner reaches of the
Kremlin — neither of which the CIA possessed. As for those
people in the intelligence community whose visceral feelings
led them to expect the worst of Khrushchev and Castro
before either had contemplated the missile gamble — to have
accepted their speculations as intelligence would have been
the height of irresponsibility. Allen Dulles and his Clandes-
tine Services lieutenants had had their own gut reactions to
events in Cuba nearly two years earlier, and when their
"feelings" were presented to the nation's leaders as intelli-
gence, the outcome was the Bay of Pigs. John McCone proved
himself a much more responsible intelligence officer than his
predecessor when, unlike Dulles, he refused to impose his
own suspicions upon the President. Hindsight may indicate
that the Dulles technique, employed by McCone, would
have had more favorable results — but hindsight is too easy.
The CIA and the rest of the intelligence community con-
ducted extensive post-mortems of the missile crisis. They
found that enough bits and pieces of information and other
tenuous evidence had been available to have warranted an
earlier judgment that the Soviets were installing their missiles.
Bureaucratic entanglements and frictions, coupled with some
degree of human imperfection, however, prevented even the
most astute intelligence officers from determining the true
purpose of Khrushchev's actions. Yet intelligence seems to
have done the best it could in the existing circumstances; the
one or two accurate agent reports picked up during Septem-
266
The CIA and the Cult of Intelligence
misleading ones. The collection of huge amounts of secret
information from a multitude of sources and the availability
of analytical staffs even larger than those available at the
time are by themselves no guarantee that the CIA and the
intelligence community will produce correct predictions. In-
telligence is in essence a guessing game, albeit one that is
grounded in fact, logic, and experience. It can be a useful
tool to the policy-makers, but it is not, even in its purest
form, a magic art.
Abusing I he Product
Unfortunately, intelligence reports are often sent to the
nation's leaders in a far from pure form, especially when the
subject is Soviet military capabilities. Y et , estimating rbe
q uantity and quahiy .'jfivip.r wrj ^^ yions is aroipabi^ The Inielli -
gcnJe community s most important t ask, since the"'^o ?L8t
Urrtmr. uiijL ViWfti^n.' w^j., ij> me iiiwy MbnifV \fi ITiHTySTId
that otf ers [f-^ >^'Mitf_lU.t ngT^uTit^TT'tWrtfflg(raaTe s^
( I he (Chinese strategic threat Ts' more potential than real.)
Every President since World War II has wanted to know
about any dangerous imbalances between American and So-
viet forces, and presidential decisions on whether or not to
go ahead with the development of new and expensive weap-
ons systems have been based, to a great extent, on intelli-
gence estimates of how strong the Russians are (although
domestic political considerations and the views of America's
allies also play a large role).
The Pentagon knows all too well that to justify its constant
demands for new weapons and larger forces, intelligence must
show that the Soviets are moving into a position of strength.*
To support a request for additional ships, the Navy will often
magnify an increased threat from the Soviet fleet. The Air
Force can much more easily obtain funds for a new bomber
if it can show that the Soviets are developing one. Similar
justifications can be — and have been — made for missiles,
tanks, and even the continuance of American programs for
chemical and biological warfare. Military analysts have tended
to take a "worst case" view of the Soviets, from which they
'Senator Stuart Symington has pointed out that scare stories about Soviet
military strength appear at congressional budget lime in springtime Washing-
ton as regularly as the cherry blossoms
Intelligence and Policy
predict the most dire possible consequences from Soviet
actions. Major General Daniel Graham, formerly chief of
estimates at the DIA, described the process in an April 1973
article in Army Magazine: "To put it bluntly, there is a
considerable body of opinion among decision-makers, in and
out of DOD [Department of Defense], which regards threat
estimates prepared by the military as being self-serving, bud-
get oriented, and generally inflated." While Graham con-
ceded that the lack of confidence in military estimates is
"fully understandable," stemming "from a series of bad
overestimates, later dubbed 'bomber gap,' 'missile gup,' and
'megaton gap,' " he asserted that the military intelligence
has now vastly improved and is capable of making objective
estimates. While most observers of the intelligence commu-
nity would agree with his assessment of the military's bad
record in estimates, few outside the Pentagon would accept
his assertion that objectivity has returned to the Pentagon's
appraisals of the Soviets, although those appraisals are un-
questionably closer to reality than they were ten years ago.
Graham illustrated another basic point that "is beginning
to be understood in military planner circles." He stated:
Estimates of future enemy forces and hardware are by
nature of intent — not just capability. The old arguments
about "capability versus intent" are heard less now in
DOD. It remains true that intelligence should empha-
size capability in descriptions of current and near-future
enemy forces. But the minute you tackle the usual prob-
lem of estimating enemy forces (or hardware) a year or
so into the future, you have entered the realm of intent.
For example, since World War II the Soviets have never
to our knowledge deployed forces of fielded hardware
as fast as their total capability permitted. To estimate
that they would do so with regard to some weapon
system or type of force in the future would make little
sense. ... It is remarkable how long it has taken some
of our military users to wise up to it.
As a result of the military's propensity to overestimate,
the CIA (usually supported by the State Department) is
almost always suspicious of Pentagon positions. Thus, the
agency tends to resist the counter military judgments, which
in turn has led to CIA underestimation. In the national-
268
The CIA and the Cult of Intelligence
security bureaucracy, the agency's tendency to be wrong on
the low side, while occurring far less frequently than the
Pentagon's errors, is considered more serious, since if esti-
mates of Soviet capabilities run too high, that provides a
margin for safety to the military planners, who may well
spend billions of dollars reacting to a non-existent threat but
who at least do not endanger the country by developing too
few weapons.
This continuing conflict between the military agencies and
the civilians in the intelligence community was most evident
in the preparation of the National Intelligence Estimates
(NIEs). which until 1973 were considered the highest form of
national intelligence.
In the internal CIA reshuffling begun by James Schlesinger
during his short stay at the agency and continued by present
Director Colby, the twelve-to-fourteen-man Board of Na-
tional Estimates and its staff of forty to fifty specialists have
been largely phased out — along with the production of thor-
oughly researched and well-thought-out community-wide
NIEs. These documents, long the epitome of finished intelli-
gence production, were found to be inadequate for the more
immediate foreign-policy purposes of Henry Kissinger and
the Nixon administratipn. Thus, the BNE has been replaced
by a group of eight senior officers known as National Intelli-
gence Officers who on short notice produce brief (no more
than ten- or twelve-page) assessments of whatever interna-
tional situation is of immediate concern to Kissinger's NSC
staff.
The net result of this change has been that long-term
estimates on broad subjects (e.g., the Outlook on Latin
America Over the Next Decade, Soviet Strategic Strike Ca-
pabilities for the Next Five Years, etc.) have given way to
short-term predictions which are little more than extensions
of current intelligence analysis. But the intelligence system is
the servant of the policy-maker and must meet his needs and
demands. Even so, the CIA's new estimating system has
failed to satisfy the NSC staff and the White House. The
tactical approach to world problems has proved to be of no
more value — and probably less — than the traditional strate-
gic view.
In the past, while the majority of the fifty or more NIEs
written each year dealt with political matters, both the
CIA and the Pentagon devoted the most work and attention
Intelligence and Policy
269
to estimates that dealt with foreign military capabilities —
especially the Soviet Union's. These NIEs, on such subjects
as Soviet strategic strike forces, air defense forces, and
general-purpose forces, influenced large decisions about the
American military budget, and each branch of the service as
well as the DIA (representing the Defense Department) as a
whole would fight fiercely to have its point of view included.
For example, in the 1963-to-1965 period when the Pentagon
was seeking funds to build an anti-ballistic-missile (ABM)
system, the military services joined together to promote the
idea that Moscow was in the process of deploying its own
ABM which would nullify the offensive nuclear threat of
American strategic forces. Thus, the Pentagon reasoned, the
United States would no longer have the power to stop the
Soviets from taking bold initiatives in Western Europe and
the TTiird World, and the security of the United States itself
would be threatened. Although the military may have be-
lieved sincerely that the Soviets were outdistancing the United
States and that Moscow would go on the offensive once it
had an advantage, the benefits to be received by the armed
services through an ABM system were still tremendously
large. The Army stood to receive billions of dollars to build
the system (and, not incidentally, get itself into the strategic-
missile field, which the Air Force and Navy had managed
to preempt). The Air Force could justify its requests for
more long-range missiles in order to overcome the Soviet
ABM defenses, and the Navy, on similar grounds, could ask
for additional funds for its missile-equipped submarines.
The CIA and the State Department, on the other hand,
did not see the Soviet ABM construction to be such a large
threat to the United States. Neither ascribed such hostile
intentions to the Soviets as the Pentagon did, and many
analysts were not even convinced that any sort of ABM
could ever be developed which could effectively stop the
other side's intercontinental missiles. (In fact, quite a few
cynical observers of the 1972 S.A.L.T. agreements believe
that the reason the American and Soviet governments agreed
to a limitation of two ABM sites each was that neither
country had real confidence that its own ABM would work
properly and thus was just as happy to be able to divert the
money into other sorts of weaponry.)
While the ABM debate was raging within the intelligence
community, both the civilian and the military analysts had
270
The CIA and the Cull of Inielligence
access to the same fragmentary information about what the
Soviets were doing in the field. There was tremendous pres-
sure for additional intelligence and the USIB was frequently
setting new collection requirements. Overt sources such as
U.S. diplomats and Soviet periodicals produced some data,
and Air Force spy planes flying along the fringes of the
Soviet Union picked up more. Huge radars and other elec-
tronic sensors located in ( DELETED ) also made a
contribution. And the most valuable information was sup-
plied by the photographic satellites.
Yet. the overall picture on the Soviet ABM was incomplete,
and the analysts were forced to make conclusions without
having all the pieces of the jigsaw puzzle before them. Often
they turned to experts at the private "think tanks" for advice.
They also consulted with American corporations — especially
Bell Laboratories — that were performing research and devel-
opment for the U.S. ABM in the hope that some of the
fragmentary data amassed would make sense to the people
working on similar systems at home.
Both the civilian and the military analysts agreed that the
Soviets were constructing some sort of new defense system
at Leningrad, and something else at Moscow. Most of the
civilians believed that the Leningrad system was aimed against
American bombers, and that the Moscow system was proba-
bly an ABM defense still undergoing research and develop-
ment. The military claimed that the Leningrad site was actu-
ally an ABM, and that research had been completed for a
more advanced ABM system which would be constructed
around Moscow.
In those years from 1963 to 1965 the military entered foot-
note after footnote in the NIEs, and the views of a divided
community went forward to the White House. The Johnson
administration made hundreds of millions of dollars of devel-
opment funds available to the Army for the American ABM,
although the Pentagon would have liked even more money
to speed up development. Several years later, intelligence
learned that the Leningrad system was indeed aimed against
planes, not missiles (although the military quickly main-
tained — and still do today — that the Leningrad site could be
quickly "upgraded" to have ABM capability), but that at
Moscow the Soviets were building a true but limited ABM.
The civilian estimate had been much closer to the truth than
Intelligence and Policy
271
the military's, but the Pentagon got the funding it wanted
from the Johnson and the Nixon administrations to proceed
with the deployment of an ABM system.
These intelligence wars are not just fought out in the privacy
of the intelligence community. All the members have on
occasion selectively disclosed secret data to the press and to
members of Congress in support of their budgetary requests.
But as columnist Joseph Kraft has written, ". . . far, far
more than the civilians in the government, the uniformed
military are in the habit of leaking information to serve their
own interests." The sanctity of classified information seems
to fall apart when fights for additional funds are under way
in Congress. Former Assistant CIA Director for Research
Herbert Scoville, Jr., was absolutely correct when he told
the Senate Foreign Relations Committee on March 28, 1972,
that "the history of the past twenty years is dotted with
example after example of intelligence being misused to pro-
mote within the Congress the programs of individual organi-
zations or even of the administration as a whole."
Newsmen friendly to the Pentagon, such as Joseph Alsop
(who helped promote the Pentagon's mythical bomber, missile,
megaton, and ABM gaps, and is currently pushing the
military's latest fright gimmick, the "technological" gap),
and William Beecher,* have long received leaks of material
marked HIGHER THAN TOP SECRET to buttress the military's
case in a particular dispute. Included have been numerous
reports based on satellite photography and communications
intercepts — collection methods so sensitive that the over-
whelming majority of government employees with security
clearances are not authorized access to the information
received.
Then Secretary of Defense Melvin Laird and other De-
fense officials publicly quoted and leaked such one-sided
intelligence during the 1969 congressional debate over the
'Beecher, for many years the New Yorl( Times' Pentagon correspondent, left
the paper in early 1U73 to become a Deputy Assistant Secretary of Defense for
Public Affairs. Ironically, his 1969 story about the secret American bombing of
Cambodia and his 1971 piece on the classified American bargaining position at
the S.A.L.T. talks have been credited by the Nixon administration as being
among the principal reasons, along with the more important leak of the
Pentagon Papers, for the formation in June 1971 of the so-called White House
plumbers to stop unauthorized disclosures in the press.
272
The CIA and the Cull of Intelligence
ABM that someone — probably in the CIA or the State
Department — countered by providing the New York Times
with the draft of a USIB estimate that refuted most of the
Pentagon arguments about the danger posed by the Soviet
ABM. In 1971 the Defense Department passed satellite-photo-
based material concerning alleged Soviet construction of a
new and larger type of missile to military-spending champion
Senator Henry Jackson. Calling the development "ominous
indeed," Jackson warned the country on March 7 about what
the Soviets were supposedly doing, at the same time that
Congress was considering the military budget. Melvin Laird
corroborated Jackson's disclosure three days later in a televi-
sion interview, and on April 22 cited fresh intelligence
"confirming the sobering fact that the Soviet Union is in-
volved in a new — and apparently extensive — ICBM construc-
tion program." Additionally, the threat described by Jackson
and Laird was made even more vivid by a spate of unattributed
supporting leaks.
Finally, an anonymous CIA employee struck back at the
Pentagon. He knew that the agency had concluded that the
Soviets were only "hardening" their missile sites rather than
deploying a huge new missile system, and that over two
thirds of the excavations mentioned by Jackson and Laird
were intended for an older and relatively small ICBM. So
this CIA man publicly disclosed the agency's secret finding,
according to the New York Times of May 26, 1971, through
"non-government arms control experts" and "Senate Republi-
can sources." Even though the CIA appraisal turned out to
be much closer to the truth than the Pentagon's gloomy
version, at least for another year, no one in the U.S. intelli-
gence community knew for sure what the Soviet missile
builders were really doing. In the meantime, the military
scare stories — offset to some extent by the CIA's counter-
leak — undoubtedly had a psychological effect on the Congress,
which in 1971, as usual, approved almost the whole Pentagon
budget request.
The tragedy of all this maneuvering is that, despite the S6
billion paid out each year for intelligence, neither the Con-
gress nor the public receives a true or worthwhile picture of
Soviet military capabilities. Intelligence professionals explain
that the sensitivitiy of the sources and methods involved in
collecting this information makes the high degree of secrecy
necessary, and they have resisted congressional attempts to
Intelligence and Policy
273
create a regular procedure for sharing data with the legislative
branch. Yet the professionals do not hesitate to leak the most
highly classified intelligence when it serves their departmen-
tal interests. Moreover, the intelligence community regularly
provides friendly foreign countries with detailed estimates of
Soviet military strength, and during the S.A.L.T. talks the
nation's negotiators even told their Soviet counterparts how
much the United States really knew about Soviet missiles.*
Yet, the American Congress, which has the constitutional
responsibility to approve funds for the military budget, can-
not get the same information.
Congress, however, has always had the legislative power
to insist that the CIA and the rest of the community share
with it information on Soviet military capabilities — or any
other subject, for that matter. Yet, to date. Congress as a
whole has refused to take such action, despite the loud
protests of a vocal minority. And Congress' unwillingness to
take even so small a step to make itself better informed
about the data used to justify military spending is sympto-
matic of the legislative branch's much larger failing: its refusal
to exercise any degree of meaningful control over American
intelligence activities.
*ln [act, ihe American S.A.L.T. negotiators were so explicit in their descrip-
tion of Soviet capabilities that at one point, according to John Newhouse's
account in his book Cold Dawn, the ranking Soviet general look an American
military man aside and asked that the U.S. not give the Soviet civilian
negotiators such detailed information on Soviet missiles.
10.
CONTROLLING THE CIA
I submit that there is no federal agency of our
government whose activities receive closer scrutiny
and "control" than the CIA.
— LYMAN KIRKPATRICK
former Executive Director. CIA
October 11. 1971
The reverseof thai statement [Kirkpatrick'sj is true
in my opinion, and it is shameful for the American
people to be so misled. There is no federal agency
of our government whose activities receive less scru-
tiny and control than the CIA.
— SENATOR STUART SYMINGTON
Member, Joint Senate
Committee for CIA Oversight
November 23. 1971
Although Harry Truman wrote in 1963 that "I never had any
thought when I set up the CIA that it would be injected into
peacetime cloak-and-dagger operations," he — and each Presi-
dent after him — willingly employed the agency to carry out
clandestine espionage and covert intervention in the internal
affairs of other countries — those activities, in short, subsumed
under the "such other functions and duties" language in the
enabling legislation. In that phrase lies the authority, accord-
ing to Richard Helms, for overthrowing foreign governments,
subverting elections, bribing officials, and waging "secret"
wars. As Helms told the American Society of Newspaper
Editors in 1971, this "language was designed to enable us to
conduct such foreign activities as the national government
may find it convenient to assign to what can best be de-
scribed as a 'secret service.' "
From its beginning, the CIA's actual functions were couched
Controlling the CIA
275
in deception and secrecy. Richard Bissell's notorious Coun-
cil on Foreign Relations speech in 1968 (see p. 327) stressed
that the original legislation was "necessarily vague." He
continued:
CIA's full "charter" has been frequently revised, but it
has been, and must remain, secret. The absence of a
public charter leads people to search for the charter and
to question the Agency's authority to undertake various
activities. The problem of a secret "charter" remains as
a curse, but the need for secrecy would appear to pre-
clude a solution.
There was never any doubt in the minds of men like
Bissell that the CIA's functions should not be a matter of
public record. In fact, the National Security Act of 1947 and
the supporting Central Intelligence Act of 1949 are little more
than legal covers which provide for the existence of the CIA
and authorize it to operate outside the rules affecting other
government agencies. The CIA's actual role is spelled out
in Bissell's "secret charter" — that series of classified exec-
utive orders called National Security Intelligence Directives
(NSCIDs or "en-skids"). These directives were "codified" in
1959, but remain unavailable to all but a few key government
officials. Not until July 1973 did the CIA offer the congres-
sional subcommittees which supposedly oversee its activities
a glimpse at the "secret charters." And the public still has
no way of knowing if the agency is exceeding its mandate,
because it has no way of knowing what that mandate is.
Duringthe 1947 congressional debate concerning the agency's
formation. Representative Fred Busby asked, "I wonder if
there is any foundation for the rumors that have come to me
to the effect that through this CIA they are contemplating
operational activities." The rumors were indeed accurate,
and the following year President Truman approved NSC
directive 10/2 which authorized first the semi-independent
Office of Policy Coordination, and then in 1951 the CIA
itself, to carry out "dirty tricks" overseas, with the two
stipulations that the operations be secret and "plausibly
deniable." A whole series of NSCIDs expanding the CIA's
activities were issued in the years that followed. One, NSCID
7, gave the CIA powers inside the United Slates to question
Americans about their foreign travels, and to enter into
276
The CIA and I he Cull of Intelligence
contractual arrangements with American universities, even
though the National Security Act of 1947 forbade the agency
to exercise any "police, subpoena, law enforcement powers,
or internal security functions." Another NSCID was appar-
ently shown to the judge in the 1966 court case in which one
Estonian-American slandered a fellow refugee and then
claimed "absolute privilege" to have done so because he was
acting under the CIA's orders. Having seen the secret
directive, the judge ruled that the agency had the power to
operate among emigre groups in the United States, and
he dismissed the suit. Yet another, NSCID 6, apparently
spells out the functions of the National Security Agency
(which itself was created by executive order), since in the
Nixon administration's 1970 secret plan for domestic espio-
nage there is a recommendation that this directive be revised
to allow NSA "coverage of the communications of U.S.
citizens using international facilities."
The essential point is that successive Presidents have regu-
larly enlarged the functions of the CIA by executive fiat. No
new laws have been passed, and only a handful of Congress-
men have been informed of what was happening. And some-
times Presidents have acted without informing even these
normally indulgent congressional "watchdogs," as was the
case when President Nixon approved the domestic spying
program, and received the CIA's cooperation. The CIA, if
nothing else, has always considered that anything a Presi-
dent told it to do was permissible — indeed, necessary — for
the defen.se of the country.
"Out of the crisis of World War II and ensuing cold war,"
Senator Jacob Javits said on July 18, 1973, "lawyers for
the President had spun a spurious doctrine of 'inherent'
commander-in-chief powers broad enough to cover virtually
every 'national security' contingency." Top CIA officials
heartily endorse this broad interpretation of presidential
powers, even though they understand that the agency's activi-
ties often are of doubtful legality. Senator Symington asked
Director-designate William Colby on July 2, 1973, "Do not
large-scale operations, such as the war in Laos, go considera-
bly beyond what Congress intended when it provided [in the
1947 act] for other functions and duties related to intelligence?"
Colby replied, "I think it undoubtedly did." But Colby
justified the Laotian operation on the grounds it was carried
out with "proper review, instructions, and direction of the
Controlling the CIA
111
National Security Council" and — most important — the Presi-
dent. The legality of the matter, in Colby's apparent view,
stemmed from the chief executive's authorization, not the
law. Senator Harold Hughes later asked Colby, "Do you
believe it is proper under our Constitution for such military
operations to be conducted without the knowledge or ap-
proval of the Congress?" Colby's written response is an
interesting commentary on the modern meaning of congres-
sional approval:
The appropriate committees of the Congress and a num-
ber of individual senators and congressmen were briefed
on CIA's activities in Laos during the period covered.
In addition, CIA's programs were described to the Ap-
propriations Committees in our annual budget hearings.*
Colby's explanation reflects the general belief in the CIA
that legislative and judicial restraints simply do not apply to
the agency — as long as it is acting under presidential order.
The CIA sees itself, in Senator Symington's words, as
"the King's men, or the President's army." Nevertheless,
Congress must take some responsibility for contributing to
the agency view of being "above the law," since it specifi-
cally exempted the CIA from all budgetary limitations which
apply to other government departments. The 1949 statute
reads: "Notwithstanding any other provision of law, sums
made available to the Agency by appropriation otherwise
may be expended for purposes necessary to carry out its
functions. . . ." This law, which also gives the DCI the right
to spend unvouchered funds,** does not say, however, that the
CIA should not be accountable to Congress; but that, essen-
tially, has been the experience of the past twenty-five years.
'Colby's claim that these committees were informed conflicts directly with
the 1971 statements of the late Senate Appropriations Committee Chairman,
Allen Ellender (quoted later in this chapter), that he knew nothing about the
CIA's 36,000-man "secret" army in Laos.
** These provisions, along with Congress' practice of hiding the CIA's budget
in appropriations to other government departmenis, may well violate the
constitutional requirement that "No money shall be drawn from the Treasury,
but in consequence of appropriations made by law; and a regular statement
and account of the receipts and expenditures of all public money shall be
published from time to time." A legal challenge (Higgs el at. v. Helms el at ) to
the CIA's secrecy in budgetary matters, based on these constitutional grounds,
is currently pending in the federal court system.
278
The CIA and the Cull of Intelligence
The 40 Committee
The executive branch has its own mechanisms to control
the CIA. While these procedures are slanted greatly to
favor the agency's position, they do require high-level —
usually presidential — approval of all major covert operations
except the CIA's classical espionage activities.
By the 1947 law, the CIA falls under the National Security
Council, reports to the President through it, and takes its
orders from it. But the NSC has, in fact, become a moribund
body during the Nixon administration, and the agency re-
ports sometimes to the President but more often to the NSC
staff headed by Henry Kissinger. By levying intelligence-
collection priority requirements and requesting analytical con-
tributions to policy studies, the Kissinger staff plays a large
part in directing the CIA's information-gathering effort. As
far as the agency is concerned, however, the NSC itself is
little more than a conduit from the President and Kissinger
to the CIA. a legal fiction which is preserved because the
1947 law gives it authority over the agency.
Every major CIA proposal for covert actior^ — including
subsidies for foreign political leaders, political parties, or
publications, interference in elections, major propaganda
activities, and the paramilitary operations — still must be
approved by the President or the 40 Committee.' The nearly
ubiquitous Kissinger chairs this committee, just as he heads
the three other principal White House panels which super-
vise the intelligence community.
Allen Dulles described the 40 Committee's role in The
Craft of Intelligence: "The facts are that the CIA has never
carried out any action of a political nature, given any sup-
port of any nature to any persons, potentates or movements,
political or otherwise, without appropriate approval at a
high political level in our government outside the CIA" (Dulles'
italics). Dulles' statement was and is correct, but he carefully
omitted any mention of the CIA's espionage activities. He
also did not mention that the 40 Committee functions in such
a way that it rarely turns down CIA requests for covert
action.
'Over Ihc bst twcniy-livc yean this body has also been called the Special
Group. Ihe 54-12 Group, and Ihc 303 Commillcc. lis name has changed wiih
new adminislraiions or whenever its existence has become publicly known.
Controlling the CIA
279
The committee is supposed to meet once a week, but the
busy schedule of its members* causes relatively frequent
cancellations. When it does meet — roughly once or twice a
month in the Nixon administration — intentionally incomplete
minutes are kept by its one permanent staff member, who is
always a CIA officer. All the proposnis for American inter-
vention overseas that come before the committee are drafted
by the CIA's Clandestine Services, and thus are likely to
maximize the benefits to be gained by agency action and to
minimize the disadvantages and risks. More often than not,
these proposals are put into final form only a few days
before the 40 Committee meets. Thus, the non-CIA mem-
bers often have little time to investigate the issues adequately.
And even when sufficient prior notice is given, the staff
work that can be done is extremely limited by the supersecrecy
surrounding the 40 Committee's deliberations and the fact
that only a handful of people outside the agency are cleared
to know about its activities. Even within the CIA the short
deadlines and the excessive secrecy allow for little indepen-
dent review of the projects by the Director's own staff.
The 40 Committee's members have so many responsibili-
ties in their own departments that they usually have only a
general knowledge about most countries of the world. On
specific problems, they generally rely on advice from their
agency's regional experts, but these officials are often denied
access to 40 Committee proposals and never are allowed to
accompany their bosses to committee sessions. Only the
DCI is permitted to bring with him an area specialist, and
the other high officials, deprived of their own spear carriers,
are at a marked disadvantage. Moreover the 40 Committee
members are men who have been admitted into the very
private and exclusive world of covert operations, and they
have an overwhelming tendency to agree with whatever is
proposed, once they are let in on the secret. The non-CIA
members of the committee have had little or no experience
in covert operations, and they tend to defer to the views of
the "experts." Columnist Stewart Alsop, himself an OSS
veteran, described in the May 25, 1973, Washington Post how
the brightest men in the Kennedy administration could have
*ln addition to Kissinger. Ihey arc currently the Under Secretary of State for
Political Affairs, the Deputy Secretary of Defense, the Director of Central
Inlcllipencc and rhr Chairman nF fhf Ininl r'hii>fc nf Cfjfr
280 The CIA and the Cull of Intelligence
approved an adventure with so small a chance of success as
the Bay of Pigs invasion, and his explanation applies just as
well to other CIA activities. Alsop stated, "The answer lies
somewhere in the mystique of the secret-service professional
vis-a-vis the amateur. Somehow in such a confrontation, the
amateur tends to put a childish faith in the confident asser-
tions of the professional." Similarly, Marilyn Berger in the
May 26, 1973, Washington Post quoted a veteran intelligence
official about his e.xperiences in dealing with the 40 Committee:
"They were like a bunch of schoolboys. They would listen
and their eyes would bug out. I always used to say that I
could get SS million out of the Forty Committee for a covert
operation faster than I could get money for a typewriter out
of the ordinary bureaucracy."
The 40 Committee process is further loaded in favor of the
CIA because the agency prepares the proposals, and discus-
sion is thereby within the CIA's terms of reference. The
non-CIA members have no way of verifying that many of
the agency's assertions and assumptions are correct; for
example, ihe Clandestine Services' June 1970 recommenda-
tion for intervention in the Chilean elections slated that the
$400,000 requested would b« used to fund "black," or
clandestine, propaganda efforts designed to hurt Salvador
Allende's candidacy, but it did not mention which publications.
Journalists, and politicians would receive the money. The
non-CIA members had to accept the agency's word that this
program would have a chance of success. For security reasons,
the specific people and methods that the CIA intends to use
in a secret operation of this type are never included in the
proposal. 40 Committee members can ask about the details
at the actual meetings, but they have no way of knowing,
without their own regional experts present, whether or not
the CIA is providing them with self-serving answers.
In fact, much of the intelligence upon which the recom-
mended intervention is based comes from the Clandestine
Services' own sources, and this mixing of the CIA's informa-
tional and operational functions can cause disastrous results,
as occurred when the agency led the Kennedy administration
to believe in 1961 that a landing of an exile military force
would lead to a general uprising of the Cuban people. A
more recent if less cataclysmic case occurred in 1970 when
intervention in the Chilean elections was under government
consideration. At that lime, the Clandestine Services sent
Controlling the CIA
281
Henry Kissinger and the heads of the various intelligence
agencies an . . . account, attributed to ... of how the Soviet
Union intended to benefit by an Allende victory. A Slate
Department official, who had regular access to CIA s . . .
material, recalb being immediately struck by the implausihil-
ityof the CIA source, ... the content of the report provided
a strong argument for U.S. intervention to forestall Soviet
gains. This report may or may not have been genuine. In
either case, it was disseminated by the people in the Clandes-
tine Services who favored intervention, and they were well
aware of the effect it would have on the 40 Committee
members. If. in this instance, the covert operators were not
actually misleading the committee, they certainly could have
been, and there was no way that any independent check
could be made on them.
Until the 1%7 disclosure of secret CIA funding of the
National Student Association and scores of other ostensibly
private organizations, the 40 Committee was called on only
to give initial approval to covert-action programs.* Thus,
most CIA-penetrated and subsidized organiz.itions went on
receiving agency funds and other support year after year
without any outside review whatever of the continuing wor-
thiness of the project. But the 1967 scandal caused the 4(1
Committee to revise its procedures so that all ongoing non-
espionage operations were regularly reviewed. In these
reviews, however, the committee is perhaps even more de-
pendent on the CIA for information and guidance than
with new programs. For unless there has been a public
controversy, only the Clandestine Services usually know
whether their efforts to subsidize a particular organization
or undermine a certain government have been successful.
And the Clandestine Services would be unlikely to admit
that their own operation was going badly, even if that were
the case.
'Final approval for a covcrl-aclion program is normally given by Ihe 40
Committee chairman — still Henry Kissinger, even since he has become Secre-
tary of State. He. in turn, notifles Ihe President of what has been decided,
and if there is a matter on which the committee was in disagreement, the chief
executive maltes the final decision. Although the President either reviews or
personally authorizes all these secret inlervenlions in other countries' internal
affairs, he never signs any documents to that effect. Instead, the onus is
placed on the 40 Commiltce, and if he chooses, the President can "plausibly
282
The CIA and the Cult of Intelligence
3 LINES DELETED
American officials hoped that through this "democratic front"
Thieu could widen his political base by rallying various non-
communist opposition elements to his camp. The effort was
a resounding failure from the American |X>int of view, since
Thieu showed no interest in broadening his support — as long
as the Vietnamese army and the U.S. government still sup-
ported him. Even though this was one of the few instances
where the State Department, through its diplomatic report-
ing from Saigon,
S LINES DELETED
Even Richard Bissell in his 1968 Council on Foreign Rela-
tions talk admitted that the 40 Committee "is of limited
effectiveness." Bissell stated that if the committee were the
only control instrument, he would "view it as inadequate,"
but he believed that prior discussions on covert projects at
working levels in the bureaucracy compensated for the fail-
ings of the "interdepartmental committee composed of busy
officials who meet only once a week." To some extent what
Bissell says is true, but he omits the fact that the most
important projects, such as the Bay of Pigs, are considered
so sensitive that the working levels outside the CIA are
forbidden all knowledge of them. And he does not state that
even when a few outside officials at the Assistant Secretary
level or just below are briefed on covert operations, they are
told the programs are so secret that they cannot talk to any
of their colleagues about them, which prevents them from
calling into play the bureaucratic forces usually needed to
block another agency's projects. Furthermore, these officials,
having been let in on the U.S. government's dirtiest and
darkest activities, are often reluctant to do anything in oppo-
sition that will jeopardize their right to be told more secrets
at a later time. Nevertheless, the bureaucracy in State and,
to a much lesser extent, in Defense does have some effect in
limiting the CIA's covert operations, although not nearly so
much as Bissell claimed.
As previously mentioned, there is one CIA activity, classi-
cal espionage, over which there is no outside control — not
from the 40 Committee, from the bureaucratic working level,
nor from Congress. The Director of Central Intelligence has
Controlling the CIA
283
a statutory responsibility to protect intelligence sources and
methods from unauthorized disclosure, and every DCI since
Allen Dulles has taken this to mean that the CIA cannot
inform any other government agencies of the identity of its
foreign agents — the agency's most closely guarded secrets.
While this secrecy in order not to jeopardize the lives of
foreigners (or Americans) who spy for the CIA is under-
standable, the use of a particular agent can sometimes have
a political effect as large as, or larger than, a covert-action
program. For example, if the CIA recruits a foreign official
who is or becomes his country's Minister of Interior (e.g.,
Antonio Arguedas in Bolivia), then discovery of his connec-
tion to the agency can cause an international incident (as
occurred in 1968 when Arguedas publicly admitted that he
had worked for the CIA). In other instances, there have
been Foreign Ministers and even Prime Ministers who were
CIA agents, but the 40 Committee never was permitted to
rule on whether or not the agency should continue its con-
tact with them. Sometimes the CIA station chief in a particu-
lar country will advise the American ambassador that one of
his agents is in a very high place in the local government or
that he intends to recruit such a man, but the station chief
does so at his own discretion.
The recruitment of lower-level foreigners can also have an
important effect, especially if something goes wrong. This
was the case in Singapore in 1960 (described in Chapter 9)
when a CIA lie-detector expert blew a fuse, wound up in
jail, caused the U.S. government to be subjected to blackmail,
and damaged America's reputation overseas. The point to
be noted is that since the CIA lie-detector man was putting a
potential spy through the "black box," his mission was part
of an espionage operation and hence not subject to control
outside the agency. Similarly, during the mid-1960s . . .
Some forms of technical espionage, however, do come before
the 40 Committee. These are the aerial and naval surveillance
missions run against foreign targets by the CIA and military
intelligence, and they are listed monthly in a "higher than
top-secret" document called the Joint Reconnaissance Schedule.
The 40 Committee's primary concern is the political sensitivity
of these missions — not their technical aspects or even their
intelligence value. The committee is supposed to warn if a
flight over or a cruise off a particular country is too danger-
ous to be carried out at a particular time. Included in the
284
The CIA and the Cult of Intelligence
schedule are SR-71 flights over North Korea and Southeast
Asia, U-2 flights over Cuba, and . . .
Prepared by the Pentagon's National Reconnaissance
Office, the Joint Reconnaissance Schedule is always several
inches thick and filled with hundreds of pages of highly
technical data and maps. To a non-scientist, it is a truly
incomprehensible collection of papers, and the stafTs of the
various 40 Committee members usually have only a day or
two to look it over before the meetings. Under these
conditions, the 40 Committee usually passes the schedule
with little or no discussion. From time to time, the State
Department will object to a particularly dangerous flight,
such as sending an Air Force drone over South China subse-
quent to the American invasion of Cambodia, but nearly
always missions — including the cruise of the Liberty (attacked
by the Israelis during the 1967 Six Day War), the voyage of
the spy ship Pueblo (captured by the North Koreans in 1968),
and the flight of the EC- 121 (shot down by the North Ko-
reans in 1969) — are routinely approved. As an illustration of
how little attention the 40 Committee gives to the Joint Recon-
naissance Schedules, the Air Force for more than ten years
flew a regular surveillance mission that came within a mile or
so of the Albanian coast. Although these spy missions to
collect electronic data on Albania's air deferxse system may
technically have never strayed over Albanian air space be-
cause of Greek ownership of the island of Corfu just off the
coast, the 40 Committee never realized that periodically from
1959 onward, it had authorized U.S. planes to fly so close to
Albania, the most unpredictable and radical communist coun-
try in Europe. In 1968, CIA analysis discovered what had
been going on and informally warned the Air Force, but the
flights continued anyway. The following year, after the North
Koreans shot down the Navy's EC -1 21 well outside their
territorial airspace, the White House ordered a review of all
reconnaissance Rights. Air Force headquarters in Washington
finally grasped the potential dangers of the Albanian flights
and quietly canceled them without informing the White House.
The Joint Reconnaissance Schedule simply became a page or
two thinner, and no one on the 40 Committee was ever the
wiser.
Even as the 40 Committee fails to keep a close watch on
secret reconnaissance activities, is relatively ineffective in
monitoring the CIA's covert operations, and is totally in the
Controlling the CIA
28S
dark on espionage operations. President Nixon and espe-
cially Henry Kissinger are unquestionably aware of its short-
comings and have done little to change things. Institutionally,
the committee could easily provide better control over Ameri-
can intelligence if its internal procedures were altered, if it
were provided with an adequate staff, and if it could develop
its own sources for information and evaluation independent
of the agency's Clandestine Services. But it is the President
and Kissinger who ultimately determine how the CIA
operates, and if they do not want to impose closer control,
then the form of the control mechanism is meaningless. The
fact remains that both men believe in the need for the
United States to use clandestine methods and "dirty tricks"
in dealing with other countries, and the current level and
types of such operations obviously coincide with their views
of how America's secret foreign policy should be carried
out.
Therefore, as long as the CIA remains the President's
loyal and personal tool to be used around the world at his
and his top advisor's discretion, no President is likely, bar-
ring strong, unforeseen pressure, to insist that the agency's
operations be brought under closer outside scrutiny.
The PFIAB and the OMB
In addition to the 40 Committee, the President has two other
bodies in the executive branch which could conceivably as-
sist him in controlling the CIA. One of these is the President's
Foreign Intelligence Advisory Board (PFIAB), a group of
eleven presidentially appointed private citizens who meet
several times a year to evaluate the activities of the intelli-
gence community and to make recommendations for needed
change. President Eisenhower originally set up the PFIAB
in 1956 under the chairmanship of Dr. James Killian of MIT,
and its other heads have been General John Hull, Clark
Clifford, General Maxwell Taylor, and, currently, retired
Admiral George Anderson. The majority of its members
have always been people with close ties to the Pentagon
and defense contractors,* and it has consistently pushed
'In February 1974. the PFIAB's members in addition to Admiral Anderson
were Dr. William Baker, Bell Telephone Laboratories' Vice President for
Research; John Connally, former Governor of Texas and Secretary of the
286
The CIA and the Cull of Inielligence
for bigger (and more expensive) intelligence-collection
systems.
The PFIAB meets approximately once a month in Wash-
ington, and is thus of limited value as a permanent watchdog
committee. It is further handicapped by its status as an
advisory group, with the resulting lack of bureaucratic
authority. In general the various members of the intelligence
community look on the board as more of a nuisance than a
true control mechanism. Periodically, when PFIAB is in
session, CIA officials brief the members on current intelli-
gence collection and the latest national estimates. The Clan-
destine Services' activities — particularly covert-action opera-
tions — are almost never considered unless an operation has
already been publicly disclosed.
Over the years. Presidents have tended to use the PFIAB
as a prestigious but relatively safe "in-house" investigative
unit, usually at times when the chief executive was dis-
pleased with the quality of intelligence he was receiving.
Whenever an intelligence failure is suspected in connection
with a foreign-policy setback, the board is usually convened
to look into the matter. President Kennedy called on it to
recommend ways to reorganize the intelligence community
after the 1961 Bay of Pigs debacle, but virtually no changes
resulted from the PFIAB's efforts. The following year Ken-
nedy asked the PFIAB to find out why the CIA had not
discovered sooner that there were Soviet offensive missiles
in Cuba, and the PFIAB found the two accurate agent
accounts of the Soviet build-up buried among the thousands
of misleading or irrelevant reports which had piled up at the
agency in the month before the crisis. With perfect hindsight
the PFIAB declared that the CIA should have recognized
the truth of these reports and rejected all the others. Similarly,
in 1968 President Johnson had the board investigate why the
CIA had not determined the precise timing of the Soviet
invasion of Czechoslovakia in advance.
These PFIAB post-mortems can be of great value to the
Navy and Ihe Treasury; L«o Chernc. Executive Director of Ihe Research
Instiiulc o( America: Dr. John Foster, former Director of Defense Depart-
ment Research and Engineering; Robert Calvin, President of Motorola;
Gordon Gray, former Assistant to Ihe President for National Security Affairs;
Dr Edwin Land. President of Polaroid; Clare Boothe Luce, former Congress-
woman and ambassador; Nelson Rockefeller, former Governor of New York;
and Dr. Edward Teller, nuclear physicist and "father" of Ihe hydrogen bomb.
Controlling the CIA
287
intelligence community in pinpointing spcciflc weaknesses and
recommending solutions; they could be even more useful in
making clear that certain events simply cannot be predicted
in advance, even by the most efficient intelligence system.
However, the PFI AB has tended to operate with the assump-
tion that all information is "knowable" and that the intelli-
gence community's problems would be solved if only more
data were collected by more advanced systems. This empha-
sis on quantity over quality has served to accentuate the
management problems that plague American intelligence and,
in recent years at least, has often been counterproductive.
Probably the PFIAB's most notable contribution to the
nation's intelligence effort occurred in the 19S()s and early
1960s when one of its subcommittees, headed by Polaroid's
Dr. Edwin Land, conceived several new technical collection
programs. Land's subcommittee was instrumental in advanc-
ing the development of the U-2 spy plane, which, with the
exception of the ill-fated Powers flight over the Soviet Union,
may be considered one of the CIA's greatest successes.
Dr. Land was also a great champion of the increased use of
reconnaissance satellites, which have become the most valuable
source of intelligence available to the United States, and the Land
panel played no small part in their development. Unfortunately,
his group has continued to recommend ever improved satellites
even at a time when existing ones can photograph objects smaller
.... The new systems are technologically feasible, but they
are fantastically expensive, costing billions of dollars, and
the intelligence benefits to be gained are marginal.
The President's last potential regulatory body for intelli-
gence affairs is the Office of Management and Budget (OMB).
Known as the Bureau of the Budget until 1969, the OMB is
the White House agency which closely scrutinizes the spend-
ing of all government departments and determines fiscal
priorities for the administration. It has the power to cut the
spending of federal agencies and even eliminate entire
programs. Cabinet secretaries can sometimes appeal the OMB's
decisions to the President, but he is understandably reluctant
to overrule his own budgetary watchdog. For the CIA,
however, the OMB (and the BOB before it) has never been
more than a minor irritant. Its International Affairs Division's
intelligence branch, which in theory monitors the finances of
the intelligence community, has a staff of only five men: a
branch chief and one examiner each for the CIA, the NSA,
288
The CIA and the Cull of Inielligence
the National Reconnaissance Office, and the DIA (including
the rest of military intelligence). These five men could not
possibly do a complete job in keeping track of the S6 billion
spent annually for government spying, even if they received
full cooperation from the agencies involved — which they do
not.
The theology of national security, with its emphasis on
secrecy and deception, greatly limits the effectiveness of the
President's budget examiners, who are generally treated as
enemies by the intelligence agencies. In this regard, the CIA
has been particularly guilty. When the OMB started monitor-
ing the agency in the 1950s, the budget man was refused a
permanent pass to visit headquarters. He was regularly forced
to wait at the building's entrance while a CIA official up-
stairs was telephoned and asked to verify the auditor's
credentials. The situation improved somewhat in 1962 after
Robert Amory. former CIA Deputy Director for Intelligence,
became head of the OMB's International Division, and the
examiner received his own badge. (The former examiner
was meanwhile recruited by the CIA and assigned to deal
with the OMB, and the new examiner turned out to be
himself a former agency employee, who eventually returned
also to handle relations with the OMB.)
In the mid-1960s President Johnson gave the OMB ex-
panded power to scrutinize agency spending, but even this
presidential mandate did not appreciably improve the bureau's
access. For example, after the 40 Committee approved in
1967 the expenditure of . . . the OMB examiner wanted to
look into how the money was being spent. At one point, he
came to the agency with the intention of speaking to the
knowledgeable personnel in the Clandestine Services, after
first stopping off to see one of the CIA's Planning, Program-
ming, and Budgeting (PPB) officers. The PPB man was told
not to let the OMB representative leave his office while
Director Helms was being informed of what the OMB was
trying to investigate. Helms promptly called a high White
House official to complain that the OMB was interfering
with a program already approved by the 40 Committee. The
White House, in turn, ordered the OMB to drop its
inquiry. . . . was expended. . . which had the 40 Committee's
and the President's approval, but the President's own budget
agency was forbidden to see where the money went.
The significance of this incident is not so much that the
Controlling the CIA
289
CIA makes life difficult for the OMB and gets away with it.
Rather, what happened reflects the agency's attitude that its
operations are above normal bureaucratic restraints and that
when the President has given his approval, not even the
technicalities can be questioned.
The CIA has also resorted to the use of outright lies and
deceit to prevent the OMB from being informed about its
activities. In 1968 an examiner made a fact-finding tour of
CIA installations in Europe and the Middle East. He was
accompanied by an agency officer from headquarters, and
his escort was specifically told by the Clandestine Services'
European Division chief that the budget man should not be
allowed to see anything "which might later cause us diffi-
culty or embarrassment." The examiner was to be entertained,
given cursory briefings, but not educated.
. . . the BOB examiner requested to visit a CIA . . . station
. . . but the Agency did not want them to go there. Although
he had left Washington with the . . . installation on his itinerary,
when he arrived . . . he was told that the CIA was then
embroiled in a bureaucratic dispute with the . . . and the
presence of an outsider at . . . would only disturb .... CIA
personnel . . . also said that . . . for him to make the trip.
Both these stories were untrue, but the BOB examiner never
got to visit the installation.
CIA headquarters knew that the OMB man was extremely
interested in guns and police work, and the field stations
were so informed.
2 LINES DELETED
he was asked if he would first like to visit Scotland Yard.
With his interest in police work, he was unable to resist such
an offer and, by prearrangement, the British police snowed
him under with extensive briefings and tours of the facilities.
This diversion, which had nothing to do with the purpose of
his trip, cost him a whole day out of his tight schedule. The
next day he was slated to drive to another CIA installation
about a hundred miles from London. But the agency did not
want him to have much time to ask questions or to look
around. Thus, his route was planned to pass through Banbury,
the picturesque old English town whose cross is of nursery-
rhyme fame. As the agency's operators had suspected, he
could not forgo the pleasure of stopping in a typical English
290
The CIA and the Cult of Intelligence
pub for lunch and then doing some sightseeing. The better
part of another day was killed in this fashion, and he never
had time to dig deeply into matters the agency did not want
him to know about. Soon after, he left England without ever
closely inspecting the agency's extensive activities there (aimed
principally at Third World countries). To be sure, he had
hardly been assiduous in his effort to penetrate the CIA
smoke screen.
In the Near East, things worked out better for the man
from OMB. The head of that division, unlike the European
Division clandestine chief, saw the tour as an opportunity to
impress the OMB examiner with the agency's activities. Thus,
the escort officer was instructed to give the visitor "the full
treatment," and the clandestine operators in the field were
told to confide in him in order to win him over to the CIA
side.
This examiner's experience was not exceptional. Many
similar instances point up the OMB's — and, earlier, the
BOB's — failure to exercise any degree of meaningful con-
trol over the CIA. As Director, Richard Helms was fully
aware and indeed encouraging of the agency's efforts to
escape OMB scrutiny. Still, he could apparently in good
conscience tell the American Society of Newspaper Editors
in 1971, "Our budget is gone over line for line by the Office
of Management and Budget."
The Ambassador
The American ambassador in each country where the United
States maintains diplomatic relations is, in theory, the head
of the "country team," which is made up of the chiefs of all
the U.S. government agencies operating in that country,
including the CIA. The Eisenhower administration origi-
nated this expanded role for the ambassador, but also issued
a secret directive exempting the CIA from his supervision.
President Kennedy, shortly after taking office, reiterated
that the ambassador should supervise all the agencies and
then sent out a secret letter which said the CIA was not to
be excluded. The Kennedy letter remains in effect today,
but its application varies from country to country.
In nearly every case, the personalities of the ambassador
and the CIA station chief determine the degree to which the
ambassador exercises control over the CIA. Strongwilled
Controlling the CIA
291
diplomats like G. McMunrie Godley, first in the Congo and
then in Laos (where he became known as the "field marshal"),
and Ellsworth Bunker in Vietnam have kept the agency
under close supervision, but they are also staunch advocates
of extensive clandestine operations. Some ambassadors insist,
as did Chester Bowles in India, that they be informed of all
CIA activities, but usually do not try to exert any control
over the operations. Still others, because of a lack of force-
fulness or a lack of interest, give the CIA a free hand and do
not even want to be informed of what the agency is up to.
Again, quoting the Bissell doctrine:
Generally the Ambassador had a right to know of any
covert operations in his jurisdiction, although in special
cases (as a result of requests from the local Chief of
State or the Secretary of State) the [CIA] chief of sta-
tion was instructed to withhold information from the
Ambassador. Indeed, in one case the restriction was
imposed upon the specific exhortation of the Ambassa-
dor in question, who preferred to remain ignorant of
certain activities.
One ambassador, John C. Pritzlaff, Jr., refused to play
such a passive role and, in a fashion highly uncharacteristic
of American envoys, stood up to the CIA. In the process,
Pritzlaff, a political appointee, became something of a hero
to the few State Department officers familiar with the way
he virtually banned CIA covert activities from his country of
assignment, Malta. The problem started early in 1970 when
retired Admiral George Anderson took a trip through the
Mediterranean countries and became alarmed that leftist
Dom Mintoff might win the Maltese elections scheduled for
the end of the year. As a Navy man, Anderson was a strong
sea-power advocate, and he feared Malta might be lost to
N.A.T.O. forces and become a base for the Soviet fleet.
Although he was not yet head of PFIAB, he used his White
House connections to urge the Clandestine Services to inter-
vene in the Maltese elections. The agency was not enthusias-
tic about the project, partly because of its lack of "assets"
on the island, but it agreed to send a clandestine operative
to make a study of how the election could be fixed. Ambassa-
dor Pritzlaff, in telegram after telegram, resisted even this
temporary assignment of an agency operative to his country.
292
The CIA and the Cull of Intelligence
In the end, the Clandestine Services did not intervene and
Mintoff was elected. N.A.T.O. retained access to the island
through British bases.*
Congress
Congressional control of the CIA can be broken down into
two distinct periods: before and after Watergate. In the agency's
first twenty-six years, the legislative branch was generally
content to vote the CIA more than enough money for its
needs, without seriously questioning how the funds would be
spent. In fact, only a handful of Congressmen even knew the
amount appropriated, since all the money was hidden in the
budgets of other government agencies, mainly the Defense
Department. To be sure, four separate subcommittees of the
House and Senate Armed Services committees were respon-
sible for monitoring the CIA, but their supervision was
minimal or nonexistent. In the House, the names of the
members were long kept secret, but they were generally the
most senior (and thus often the most conservative) men on
their respective committees. (Allen Dulles was reported by
the New York Times in April 1966 to have had "personal
control" over which Congressmen would be selected.) In
August 1971, House Armed Services chairman F. Edward
Hebert of Louisiana broke with past practice and dipped
down his committee's seniority ladder to appoint Lucien
Nedzi, a hard-working liberal from Michigan, head of the
oversight subcommittee. Hubert, however, kept complete
control of the subcommittee's staff, and Nedzi is the only
non-conservative among the panel's five permanent and two
ex officio members. When Hubert made his unusual choice,
it was widely speculated that he was trying to defuse outside
criticism of the subcommittee's performance by naming a
liberal as chairman, and that he felt he could keep Nedzi
isolated. Nedzi had little time for overseeing the CIA during
1972, his first full year as chairman, because he faced tough
primary and re-election challenges. In 1971, he launched a
'Anderson's fears seemed paniatly juslificd. however, in 1971, when Mintoff
precipilaied a mini-crisis by expclhng the N.A.T.O. commander from the
island and by greatly increasing the cost to Britain of keeping its facilities
there. In an incident reminiscent of Cyprus President Makarios' blackmail of
U S intelligence several years before, the U.S. government was forced to
contribute several million dollars to help the British pay the higher rent for
the Maltese bases.
Controlling the CIA
293
comprehensive inquiry into the agency's role in the Watergate
affair, but it remains to be seen whether his subcommittee
will delve any deeper into CIA covert operations than the
House panels have done in the past. In the Senate the
Armed Services and Appropriations subcommittees have tra-
ditionally met together to maintain joint oversight of the
CIA. As is true in the House, the members have almost all
been conservative, aging, military-oriented legislators.
Many Congressmen and Senators — but by no means a
majority — believe that these oversight arrangements are
inadequate, and since 1947 nearly ISO separate pieces of legisla-
tion have been introduced to increase congressional surveil-
lance of the CIA. None has passed either chamber, and the
House has never even had a recorded vote on the subject.
The Senate, by a 59-27 margin in 1956, and by 61-28 in 1966, has
turned down proposals for expanded and more active watch-
dog committees for the agency and the rest of the intelli-
gence community. To strengthen his vote. Senator Richard
Russell, then chairman of the case for maintaining the status
quo at the time of the 1966 Armed Services Committee,
agreed that starting in 1967 the three senior members of the
Foreign Relations Committee would be allowed unofficially
to sit in on the joint oversight subcommittee's meetings. But
after this arrangement was in effect for several years, Sena-
tor John Stennis, Russell's successor as chairman, simply
stopped holding sessions. There was not a single one in
either 1971 or 1972. Stennis is generally believed to have
ended the subcommittee's functions because foreign-policy
liberals J. William Fulbright and Stuart Symington would
have been present for the secret deliberations. Neither man
was trusted at the time by either the CIA or by the conserva-
tive Senators who have kept oversight of the CIA as their
own private preserve. In the absence of any joint subcommit-
tee meetings, the five senior members of the Appropriations
Committee, all of whom were staunch hawks and administra-
tion supporters, met privately to go over the agency's budget.
Senator Symington challenged this arrangement on Novem-
ber 23, 1971, when, without prior warning, he introduced a
floor amendment which would have put a S4 billion limit on
government-wide intelligence spending — roughly $2 billion
less than what the administration was requesting. Although
Symington's amendment was defeated 51-36, it produced per-
294
The CIA and the Cull of Inielligence
haps the most illuminating debate on intelligence ever heard
in the Senate.
Symington berated the fact that the Senate was being
asked to vote billions of dollars for intelligence with only
five Senators knowing the amount; and in a colloquy with
the Appropriations chairman, the late Allen Ellender,
Symington established that even those five Senators had
limited knowledge of the CIA's operations. Ellender replied
to Symington's question on whether or not the appropria-
tions subcommittee had approved the financing of a 36,000-
man "secret" army in Laos:
I did not know anything about it. ... I never asked, to
begin with, whether or not there were any funds to
carry on the war in this sum the CIA asked for. It never
dawned on me to ask about it. I did see it published in
the newspapers some time ago.
Laos, was, of course, the CIA's largest operation at the
time that supposed overseer Ellender admitted ignorance
about it. Richard Russell, too, had had a similar lack of
interest in what the CIA was doing. He had once even told
CIA Director Helms — privately — that there were certain op-
erations he simply did not want to know about. Senator
Leverett Saltonstall, who served for many years as ranking
Republican on the oversight subcommittee, expressed the
same view publicly in 1966: "It is not a question of reluctance
on the part of CIA officials to speak to us. Instead it is a
question of our reluctance, if you will, to seek information
and knowledge on subjects which 1 personally, as a member
of Congress and as a citizen, would rather not have."
Faced with this rejection of responsibility on the part of
the congressional monitors, the CIA has chosen to keep the
subcommittee largely in the dark about its covert operations —
unless a particular activity, such as the 1%7 black-propaganda
effort against mainland China, has been successful in the
agency's eyes and could be bragged about to the legislators.
Helms did make frequent visits to Capitol Hill to give secret
briefings, but these usually concerned current intelligence
matters and estimates of the communist countries' military
capabilities — not the doings of the Clandestine Services. Yet
Helms won a reputation among lawmakers as a man who
Controlling the CIA
295
provided straight information.* Senator J. William Fulbright,
who sat in on Helms' briefings to the joint oversight commit-
tee until they were discontinued in 1971. described the pro-
ceedings to author Patrick McGarvey for the latter's CM;
The Myth and the Madness:
The ten minute rule is in effect, so the members have
little if any chance to dig deep into a subject. The
director of CIA spends most of the time talking about
the Soviet missile threat and so on. The kind of informa-
tion he provides is interesting, but it really is of little
help in trying to find out what is going on in intelligence.
He actually tells them only what he wants them to
know. It seems to me that the men on the committee
are more interested in shielding CIA from its critics
than in anything else.
Once a year the CIA does come before the appropriations
subcommittees in both houses to make its annual budget
request. These sessions, however, are completely on the
agency's terms. Prior to the meeting, CIA electronics ex-
perts make an elaborate show of sweeping the committee
rooms for bugging devices, and blankets are thrown over the
windows to prevent outside surveillance. The transcripts of
the sessions are considered so secret that copies are locked
up at CIA headquarters. Not one is left with the subcommit-
tees for future study. Committee staff members, who nor-
mally do most of the substantive preparation for hearings,
are banned at the CIA's request.**
*Allhough Helms had been for many years providing current intelligence and
eslimales to congressional committees in secret oral briefings, the CIA offi-
cially opposed legislation introduced in 1972 by Senator John Sherman Cooper
of Kentucky which would have provided the appropriate committees with the
same sort of data in the form of regular CIA reports. The bill was favorably
approved by the Foreign Relations Committee, but subsequently died in
Armed Services. Director-designate William Colby told the latter committee
in July 1973 that he thought this information could be supplied on an informal
basis "without legislation."
**A relatively similar procedure is followed when an individual Senator or
Congressman writes to the CIA about a covert operation. Instead of sending a
letter in return, an agency representative offers to brief the legislator penonally
on the matter, on the condition that no staff members are present. This
procedure puts the busy lawmaker at a marked disadvantage, since his staff is
usually more familiar with the subject than he is — and probably wrote the
296
The CIA and the Cult of Inielligence
Allen Dulles set the tone for these CIA budget presenta-
tions in the 1950s when he commented to a few assistants
preparing him for his annual appearance, "I'll just tell them
a few war stories." A more current example of the CIA's
evasive tactics occurred in 1966 when the Senate appropria-
tions subcommittee was thought to have soe hard ques-
tions to ask about the growing costs of technical espionage
programs. DCI Helms responded to the senatorial interest
by bringing with him the CIA's Deputy Director for Science
and Technology, Dr. Albert D. "Bud" Wheelon, who loaded
himself up with a bag full of spy gadgets — a camera hidden
in a tobacco pouch, a radio transmitter hidden in false teeth,
a tape recorder in a cigarette case, and so on. This equip-
ment did not even come from Wheelon's part of the agency
but was manufactured by the Clandestine Services; if,
however, the Senators wanted to talk about "technical"
matters. Helms and his assistant were perfectly willing to
distract them with James Bond-type equipment.
Wheelon started to discuss the technical collection programs,
but as he talked he let the Senators inspect the gadgets.
Predictably, the discussion soon turned to the spy parapher-
nalia. One persistent Senator asked two questions about the
new and expensive technical collection systems the CIA was
then putting into operation, but Wheelon deftly turned the
subject back to the gadgets. When the Senator asked his
question a third time. Chairman Russell told him to hold his
inquiry until the CIA men were finished. But the Senators
became so enthralled with the equipment before them that
no more questions were asked.*
In 1967 the CIA, as usual, prepared its budget request with
a dazzling collection of slides and pictures, emphasizing the
agency's role in fighting communism around the world and
producing intelligence on the military threat posed by the
Soviet Union and China. Also included in the "canned"
briefing was a description of the CIA's technical collection
expertise, its work with computers and other information-
processing systems, and even its advanced techniques in
printing — but, again, no "dirty tricks." The presentation was
'Seven years later, the same panel would invescigate the 1971 assistance
furnished by the Oandestine Services toT. Howard Hum and Gordon Liddy
for their "plumbers" operations — assistance comprised of many of the same
gadgets that amused the Senators in 1966.
Controlling the CIA
297
rehearsed several times at CIA headquarters while calls were
awaited from Capitol Hill to set specific dates. A Congress-
man serving on the House appropriations oversight group
was even invited to come out to the agency to see one of the
dry runs. A few days later a staff man on the House panel
telephoned the CIA to say that the Congressman who had
seen the rehearsal said that everything seemed in order and
that the chairman simply did not have the time to hear the
presentation, but that the committee would approve the full
budget request of nearly S7(X) million anyway. Shortly there-
after a similar call came from the Senate committee. The
chairman had apparently been told by his opposite number
in the House that the CIA request seemed reasonable, and
on the strength of the House recommendation the Senate
would also approve the full amount without a hearing.
Thus, in 1967 the CIA did not even appear in front of its
budgetary oversight committees. TTie experience that year
was extreme, but it does illustrate how little congressional
supervision the agency has been subject to over the years.
Many congressional critics of the CIA have advocated
broadening the membership of the CIA oversight subcommit-
tees to include legislators who will hold the agency up to the
same sort of scrutiny that other government departments
receive. They argue that in the equally sensitive field of
atomic energy a joint congressional committee has kept close
track of the Atomic Energy Commission without any breach
in security. However, some liberals who advocate greater
control of the CIA fear that a joint CIA committee analo-
gous to the Joint Atomic Energy Committee might easily be
"captured" by the agency, just as the atomic energy commit-
tee has, to a large extent, been coopted by the AEC.
Those who oppose increased congressional control of the
agency claim that if the CIA is to operate effectively, total
secrecy must be maintained, and that expanding the functions
and the membership of the oversight subcommittees would
mean much greater likelihood of breaches in security. They
fear that larger subcommittees would necessarily lead to the
presence of administration opponents who might exploit
agency secrets for political gains. Moreover, it is said that
friendly foreign intelligence services would be reluctant to
cooperate or share secrets with the agency if they knew that
their activities would be revealed to the American Congress.
No matter what the merits of the arguments for closer
298 The CIA and the Cull of Inlelligence
congressional control, there was no chance that a majority of
either house would vote for any appreciable change until the
Watergate affair broke wide open in early 1973. Suddenly the
long-dormant oversight subcommittees began to meet fre-
quently to investigate the degree of CIA involvement in the
illegal activities sponsored by the White House and the
Committee to Re-Elect the President. The obvious abuses of
power by the administration and its supporters stirred even
conservative legislators into demands for corrective action.
And the administration, in trying to justify its excesses on
the grounds of protecting the "national security" — a justifica-
tion largely unacceptable to Congress — seriously weakened
the position of those who claimed that the CIA's actions
should escape scrutiny on those same "national security"
grounds. Furthermore, there was a widespread public and
media outcry against concentration of power in the White
House, and against President Nixon's penchant for taking
unilateral actions without the approval or even the advice of
Congress. The CIA, as the President's loyal tool — tainted to
some extent by involvement in Watergate-related activities —
also became vulnerable.
The four oversight subcommittees which met so frequently
in the first six months of 1973 are still made up of the same
overwhelmingly conservative members. But, pushed by ei-
ther their own revulsion over Watergate or by public reac-
tion to it, they seem likely to take some action to increase
i'. congressional surveillance of the CIA.
For example, John Stennis, the Senate Armed Services
chairman, declared on July 20, 1973: "The experience of the
CIA in Laos, as well as the more recent disclosures here at
home have caused me to defmitely conclude that the entire
CIA act should be entirely reviewed." This is the same
Stennis who nineteen months earlier, when the CIA's "secret"
war in Laos was at its peak, stated:
This agency is conducted in a splendid way. ... As has
been said, spying is spying. But if we are going to have
an intelligence agency, ... it cannot be run as if you
were running a tax collector's office or the HEW or
some other such department. You have to make up
your mind that you are going to have an intelligence
agency and protect it as such, and shut your eyes some
and take what is coming.
Controlling the CIA
299
Yet, from all indications, Stennis has become sincerely
convinced that the chief executive, on his own, should never
again be able to take the country into a Vietnam-type conflict,
On Octorber 18, 1973, he introduced legislation — while re-
serving his right to change it after study and hearings extend-
ing into 1974 — which would modify the CIA's legal base.
First, it would limit the agency's domestic activities to "those
which are necessary and appropriate to its foreign intelli-
gence mission," apparently defining this in a way to abolish
covert activities in the United States. Second, it would set up
tighter procedures for congressional oversight, while "recog-
nizing essential security requirements."
A simple majority in either chamber would be sufficient to
change the present system of CIA oversight. As much as the
agency wants to keep its activities secret, it would have little
choice but to comply with serious congressional demands for
more information and more supervision. The power of the
purse gives the legislative branch the means to enforce its
will on a reluctant CIA, and even one house standing alone
could use this power as a control mechanism. That is, assum-
ing that Congress is willing to accept the responsibility.
The CIA and the Press
In a recent interview, a nationally syndicated columnist with
close ties to the CIA was asked how he would have reacted
in 1%1 if he had uncovered advance information that the
agency was going to launch the Bay of Pigs invasion of
Cuba. He replied somewhat wistfully, "The trouble with the
establishment is that I would have gone to one of my friends
in the government, and he would have told me why I shouldn't
write the story. And I probably wouldn't have written the
story."
It was rather fitting that this columnist, when queried
about exposing a CIA operation, should have put his answer
in terms of the "establishment" (of which he is a recognized
member), since much of what the American people have
learned — or have not learned — about the agency has been
filtered through an "old-boy network" of journalists friendly
to the CIA. There have been exceptions, but, by and large,
the CIA has attempted to discourage, alter, and even sup-
press independent investigative inquiries into agency activities.
The CIA's principal technique for fending off the press
300
The CIA and the Cult of Intelligence
has been to wrap itself in the mantle of "national security."
Reporters have been extremely reluctant to write anything
that might endanger an ongoing operation or, in Tom Wicker's
words, "get an agent killed in Timbuktu." The CIA has, for
its part, played upon these completely understandable fears
and used them as a club to convince newsmen that certain
stories should never be written. And many reporters do not
even have to be convinced, either because they already
believe that the CIA's activities are not the kind of news that
the public has a right to know or because in a particular case
they approve of the agency's aims and methods.
For example, on September 23, 1970, syndicated columnist
Charles Bartlett was handed, by a Washington-based official
of ITT, an internal ITT report sent in by the company's two
representatives in Chile, Mai Hendrix and Robert Berrellez.
This eight-page document— marked PERSONAL and confi-
dential — said that the American ambassador to Chile had
received the "green light to move in the name of President
Nixon . . . (with] maximum authority to do all possible —
short of a Dominican Republic-type action — to keep Allende
from taking power." It stated that the Chilean army "has
been assured full material and financial assistance by the
U.S. military establishment" and that ITT had "pledged [its
financial] support if needed" to the anti-Aliende forces. The
document also included a lengthy run-down of the political
situation in Chile.
With the material for an expose in his hands, Bartlett did
not launch an immediate investigation. Instead, he did ex-
actly what ITT hoped he would do: he wrote a column about
the dangers of a "classic Communist-style assumption of
power" in Chile. He did see some hope that "Chile will find
a way to avert the inauguration of Salvador Allende," but
thought there was little the United States could "profitably
do" and that "Chilean politics should be left to the Chileans."
He did not inform his readers that he had documentary
evidence indicating that Chilean politics were being left to
the CIA and ITT.
Asked why he did not write more, Bartlett replied in a
1973 telephone interview, "I was only interested in the politi-
cal analysis. I didn't take seriously the Washington stuff —
the description of machinations within the U.S. government.
[The ITT men who wrote the report] had not been in
Washington; they had been in Chile." Yet, by Bartlett's own
Conirolling I he CIA
301
admission, his September 28 column was based on the ITT
report — in places, to the point of paraphrase. He wrote
about several incidents occurring in Chile that he could not
possibly have verified in Washington. Most reporters will
not use material of this sort unless they can check it out with
an independent source, so Bartlett was showing extraordi-
nary faith in the reliability of his informants. But he used
their material selectively — to write an anti-Allende scare
piece, not to blow the whistle on the CIA and ITT.
An ITT official gave the same report to Time's Pentagon
correspondent, John Mulliken. Mulliken covered neither the
CIA nor Chile as part of his regular beat, and he sent the
ITT document to Time's headquarters in New York for
possible action. As far as he knows. Time never followed up
on the story. He attributes this to "bureaucratic stupidity —
the system, not the poeple." He explains that Time had
shortly before done a long article on Chile, and New York
"didn't want to do any more."
Thus, the public did not learn what the U.S. government
and ITT were up to in Chile until the spring of 1972, when
columnist Jack Anderson published scores of ITT internal
documents concerning Chile. Included in the Anderson papers,
as one of the most important exhibits, was the very same
document that had been given eighteen months earlier to
Bartlett and Time magazine.
Jack Anderson is very much a maverick among Washing-
ton journalists, and he will write about nearly anything he
learns — and can confirm — about the U.S. government and
the CIA. With a few other notable exceptions, however, the
great majority of the American press corps has tended to
stay away from topics concerning the agency's operations.
One of the reasons for this is that the CIA, being an ex-
tremely secretive organization, is a very hard beat to cover.'
Newsmen are denied access to its heavily guarded buildings,
except in tightly controlled circumstances. No media outlet
in the country has ever assigned a full-time correspondent to
the agency, and very few report of its activities even on a
part-time basis. Except in cases where the CIA wants to leak
some information, almost all CIA personnel avoid any con-
tact whatsoever with journalists. In fact, agency policy de-
crees that employees must inform their superiors immediateljl
of any and all conversations with reporters, and the ordinary
302
The CIA and the Cull of Inielligence
operator who has too many of these conversations tends to
become suspect in the eyes of his co-workers.
For the general view in the CIA (as in some other parts of
the federal government) is that the press is potentially an
enemy force — albeit one that can be used with great success
to serve the agency's purposes. Former Deputy Director for
Intelligence Robert Amory was speaking for most of his
colleagues when in a February 26, 1967, television interview
he said that press disclosures of agency funding of the Na-
tional Student Association and the other private groups were
"a commentary on the immaturity of our society." With the
pronounced Anglophile bias and envy of Britain's Official
Secrets Act so common among high CIA officials, he com-
pared the situation to our "free motherland in England,"
where if a similar situation comes up, "everybody shushes
up in the interest of their national security and . . . what they
think is the interest of the free world civilization."
Former CIA official William J. Barnds* was even more
critical of journalistic probes of the agency in a January I%9
article in the influential quarterly Foreign Affairs:
The diwrlosurc of intelligence activities in the press in
recent years h a clear national liability. Iliese disclo-
sures have created a public awareness that the U.S.
government has, at least ai times, resorted to coven
operations in inappropriate situations, failed to main-
lain secrecy and failed to review ongoing operations
adequately. The public reve lations of those weaknesses,
even though the^y are now part ially cgfre cte'd. ham pers
CIA (and the U.S. govertiment) by liiriTting those w ill-
ing to cooperate with it ant) its activities. As Ions
.su^ aisclos u rer'rffllH ffl IT1 tTTfi pUMic mind, any otricial
effort to improv e ClA'i lllUHe tr^ lik ely to Pa Cktire a s
to SUCCfCtl"
Barnds' admission that the CIA has certain weaknesses is
unusual coming from a former (or present) agency official,
but very few in the CIA would disagree with his statement
'Barnds had been with the agency's Office of National Estimates until he
joined the staff of the Council on Foreign Relations in (he mid-l96()s. In 1968
he was the sccrelai> ai the CFR session where Richard Disscll laid out his
views on covert operations.
Controlling the CIA
303
that press stones about intelligence operations are a "national
liability."
The CIA's concern about how to deal with repwrters and
how to use the press to best advantage dates hack lo the
agency's beginnings. During the IQSOs the agency was ex-
tremely wary of any fonnal relations with the media, and the
standard answer to press inquiries was that the CIA "does
not confirm or deny published reports. "
To be sure, there was a CIA press office, hut it was not a
very important part of the agency's organization. To CIA
insiders, its principal function seemed to be to clip newspaper
articles about the CIA and to forward them to the interested
component of the agency. The press office was largely by-
passed by Director Allen Dulles and a few of his chief aides
who maintained contact with certain influential reporters.
Dulles often met his "friends" of the press on a back-
ground basis, and he and his Clandestine Services chief,
Frank Wisner, were extremely interested in getting across to
the American people the danger posed to the country by
international communism. They stressed the CIA's role in
combating the communist threat, and Dulles liked to brag,
after the fact, about successful agency operations. The re-
porters who saw him were generally fascinated by his war
stories of the intelligence trade. Wisner was particularly
concerned with publicizing anti-communist emigre groups
(many of which were subsidized or organized by the CIA),
and he often encouraged reporters to write about their
activities.
According to an ex-CIA official who worked closely with
Wisner, the refugees from the "captive nations" were used
by the CIA to give credence to the idea that the United
Stateswastruly interested in "rolling back the Iron Curtain."
This same former CIA man recalls Dulles and Wisner fre-
quently telling subordinates, in effect; "Try to do a better
job in influencing the press through friendly intermediaries."
Nevertheless, the agency's press relations during the Dul-
les era were generally low-keyed. Reporters were not in-
clined to write unfavorable or revealing stories about the
CIA, and the agency, for its part, received a good deal of
useful information from friendly newsmen. Reporters like
Joseph Alsop, Drew Pearson, Harrison Salisbury, and scores
of others regularly sat down with CIA experts to be de-
briefed after they returned from foreign travels. These
304
The CIA and the Cult of Intelligence
newsmen in no way worked for the agency, but they were
glad to provide the incidental information that a traveler
might have observed, such as the number of smokestacks on
a factory or the intensity of traffic on a railroad line. The
Washington bureau chief of a large newspaper remembers
being asked, after he returned from Eastern Europe, "to fill
in the little pieces which might fit into the jigsaw puzzle."
This type of data was quite important to the intelligence
analyst in the days before the technical espionage programs
could supply the same information. The agency's Intelli-
gence Directorate routinely conducted these debriefings of
reporters, as it does today. Selected newsmen, however,
participated in a second kind of debriefing conducted by the
Clandestine Services. In these the emphasis was on the per-
sonalities of the foreign officials encountered by the newsmen
(as part of the unending probe for vulnerabilities) and the
operation of the internal-security systems in the countries
visited.
At the same time the CIA was debriefing newsmen, it was
looking for possible recruits in the press corps or hoping to
place a CIA operator under "deep cover" with a reputable
media outlet. The identities of these bogus "reporters" were
(and are) closely guarded secrets. As late as November 1973,
according to Oswald Johnston's Washington Star-News re-
port (confirmed by other papers), there were still about
forty full-time reporters and free-lancers on the CIA payroll.
Johnston reported that CIA Director Colby had decided to
cut the "five full-time staff correspondents with general-
circulation news organizations," but that the other thirty-five
or so "stringers" and workers for trade publications would
be retained. American correspondents often have much
broader entree to foreign societies than do officials of the
local American embassy, which provides most CIA opera-
tors with their cover, and the agency simply has been unable
to resist the temptation to penetrate the press corps, al-
though the major media outlets have almost all refused to
cooperate with the CIA.
William Attwood, now publisher of Newsday, remembers
vividly that when he was foreign editor of Look during the
19S0s a CIA representative approached him and asked if
Look needed a correspondent in New Delhi. The agency
offered to supply the man for the job and pay his salary.
Attwood turned the agency down.
Controlling the CIA
305
Clifton Daniel, former managing editor of the New York
Times and now that paper's Washington bureau chief, states
that in the late 1950s "I was very surprised to learn that a
correspondent of an obscure newspaper in an obscure part
of the world was a CIA man. That bothered me." Duniel
promptly checked the ranks of Times reporters for similar
agency connections, but found "there did not seem to be
any." He believes that one reason why th'e Times was clean
was that "our people knew they would be fired" if they
worked for the agency.
In 1955 Sam Jaffe applied for a job with CBS News. While
he was waiting for his application to be processed, a CIA
official whom Jaffe Identifies as Jerry Rubin.s visited his
house in California and told him, "If you are willing to work
for us, you are going to Moscow" with CBS. Jaffe was
flabbergasted, since he did not even know at that point if
CBS would hire him, and he assumes that someone at CBS
must have been in on the arrangement or otherwise the
agency would never have known he had applied for work.
Moreover, it would have been highly unusual to send a new
young reporter to such an important overseas post. Rubins
told Jaffe that the agency was "willing to release certain
top-secret Information to you in order that you try and
obtain certain information for us." Jaffe refused and was
later hired by CBS for a domestic assignment.
Before the CIA's successful armed invasion of Guatemala
in 1954, a Time reporter dropped off the staff to participate,
by his own admission, in the agency's paramilitary operations
in that country. After the Guatemalan government had been
overthrown, he returned to the Time offices in New York and
asked for his old job back. According to another Time staffer,
the managing editor asked the returned CIA man if he were
still with the agency. The man said no. The managing editor
asked, "If you were still really with the CIA and I asked you
about It, what would you say?" The returned CIA man
replied, "I'd have to say no." Time rehired him anyway.*
'More recently CIA men have turned up as "reporters" in foreign countries
for little-known publications which could not possibly afford to pay their
salaries without agency assistance. Stanley Karnow, formerly the Washington
Post's Asian correspondent, recalls, 'I remember a guy who came to Korea
with no visible means of support He was supposed to be a correspondent for
a small paper in New York. In a country where k takes years to build up
acquaintances, he immediately had good contacts, and he dined with the CIA
station chief. It was common knowledge he worked for the agency."
306
The CIA and the Culi of Intelligence
The Dulles years ended with two disasters for the CIA
that newspiipers learned of in advance but refused to share
fully with their readers. First came the shooting down of the
U-2 spy plane over the Soviet Union in 1960. Chalmers
Roberts, long the Washington Post's diplomatic correspondent,
confirms in his book First Rough Draft that he and "some
other newsmen" knew about the U-2 flights in the late 1950s
and "remained silent." Roberts explains, "Retrospectively,
it seems a close question as to whether this was the right
decision, but I think it probably was. We took the position
that the national interest came before the story because we
knew the United States very much needed to discover the
secrets of Soviet missilery."
Most reporters at the time would have agreed with Rich-
ard Bissell that premature disclosure would have forced the
Soviets "to take action." Yet Bissell admitted that "after
five days" the Soviets were fully aware that the spy planes
were overflying their country, and that the secrecy main-
tained by the Soviet and American governments was an
example "of two hostile governments collaborating to keep
operations secret from the general public on both sides."
TTie whole U-2 incident may well have been a watershed
event. For much of the American press and public it was the
first indication that their government lied, and it was the
opening wedge in what would grow during the Vietnam
years into the "credibility gap." But as the Eisenhower
administration came to an end, there was still a national
consensus that the fight against communism justified virtu-
ally any means. The press was very much a part of the
consensus, and this did not start to crack until it became
known that the CIA was organizing an armed invasion of
Cuba.
Five months before the landing took place at the Bay of
Pigs, the Nation published a secondhand account of the
agency's efforts to train Cuban exiles for attacks against
Cuba and called upon "all U.S. news media with correspon-
dents in Guatemala," where the invaders were being trained,
to check out the story. The New York Times responded on
January 10, 1961, with an article describing the training, with
U.S. assistance, of an anti-Castro force in Guatemala. At
the end of the story, which mentioned neither the CIA nor a
possible invasion, was a charge by the Cuban Foreign Minis-
ter that the U.S. government was preparing "mercenaries"
Conirolling the CIA
307
in Guatemala and Florida for military action against Cuba.
Turner Catledge, then the managing editor of the Times,
declared in his book My Life and The Times: "I don't think
that anyone who read the story would have doubted that
something was in the wind, thai the United States was deeply
involved, or that the New York Times was onto the story."
As the date for the invasion approached, the New Repub-
lic obtained a comprehensive account of the preparations for
the operation, but the liberal magazine's editor-in-chief. Gil-
bert Harrison, became wary of the security implications and
submitted the article to President Kennedy for his advice.
Kennedy asked that it not be printed, and Harrison, a friend
of the President, complied. At about the same time. New
York Times reporter Tad Szulc uncovered nearly the com-
plete story, and the Times made preparations to carry it on
April 7, 1961, under a four-column headline. But Times pub-
lisher Orvil Dryfoos and Washington bureau chief James
Reston both objected to the article on national-security
grounds, and it was edited to eliminate all mention of CIA
involvement or an "imminent" invasion. The truncated story,
which mentioned only that 5,000 to 6,000 Cubans were being
trained in the United States and Central America "for the
liberation of Cuba," no longer merited a banner headline
and was reduced to a single column on the front page. Times
editor Clifton Daniel later explained that Dryfoos had or-
dered the story toned down "above all, [out of| concern for
the safety of the men who were preparing to offer their lives
on the beaches of Cuba."
Times reporter Szulc states that he was not consulted
about the heavy editing of his article, and he mentions that
President Kennedy made a personal appeal to publisher
Dryfoos not to run the story. Yet, less than a month after
the invasion, at a meeting where he was urging newspaper
editors not to print security information, Kennedy was able
to say to the Times' Catledge, "If you had printed more
about the operation, you would have saved us from a colos-
sal mistake."
The failure of the Bay of Pigs cost CIA Director Dulles
his job, and he was succeeded in November 1961 by John
McCone. McCone did little to revamp the agency's policies
in dealing with the press, although the matter obviously
concerned him, as became evident when he reprimanded
and then transferred his press officer, who he felt had been
308
The CIA and the Cull of Intelligence
too forthcoming with a particul.ir reporter. In McCone's first
weeks at the agency, the New York Times got wind of the
fact that the CIA was training Tibetans in paramilitary tech-
niques at an agency base in Colorado, but, according to
David Wise's account in The Politics of Lying, the Office of
the Secretary of Defense "pleaded" with the Times to kill
the story, which it did. In the Cuban missile crisis of 1962,
President Kennedy again prevailed upon the Times not to
print a story — this time, the news that Soviet missiles had
been installed in Cuba, which the Times had learned of at
least a day before the President made his announcement to
the country.*
Then, in 1964, McCone was faced with the problem of how to
deal with an upcoming book about the CIA, and his response
was an attempt to do violence to the First Amendment.
The book was The Invisible Government, by reporters
David Wise of the A'eiv York Herald Tribune and Thomas
Ross of the Chicago Sun-Times. Their work provided an
example of the kind of reporting on the agency that other
journalists might have done but had failed to do. In short, it
was an example of investigative reporting at its best and,
perhaps as a result, it infuriated the CIA.
McCone and his deputy. Lieutenant General Marshall
Carter, both personally telephoned Wise and Ross's publisher.
Random House, to raise their strong objections to publica-
tion of the book. Then a CIA official offered to buy up
the entire first printing of over 15,000 books. Calling this
action "laughable," Random House's president, Bennett
Cerf, agreed to sell the agency as many books as it wanted,
but stated that additional printings would be made for the
public. The agency also approached Look magazine, which
had planned to run excerpts from the book, and, according
to a spokesman, "asked that some changes be made — things
they considered to be inaccuracies. We made a number of
changes but do not consider that they were significant."
'According lo the Timti M»i Frankel. writing in the Winter 1973 Columbia
Forum, there was still a feeling that the paper had been "remiss" In withhold-
ing information on the Bay of Pigs, so the Times extracted a promise from (he
President thai while the paper remained silent he would "shed no blood and
start no war." Frankel notes that "no such bargain was ever struck again,
though many officials made overtures. The essential ingredient was trust, and
thai was lost somewhere between Dallas and Tonkin."
Controlling the CIA
309
The final chapter in the agency attack against The Invisi-
ble Government came in 196S when the CIA circulated an
unattributed document on "The Soviet and Communist Bloc
Defamation Campaign" to various members of Congress
and the press. l~his long study detailed the many ways used
by the KGB to discredit the CIA, including the "development
and milking of Western journalists. Americans figure promi-
nently among these." The study singled out as an example of
KGB disinformation a Soviet radio broadcast that quoted
directly from The Invisible Government. The agency's mes-
sage was not too subtle, but then the CIA never put its name
on the document.
when Richard Helms took over the agency in 1966, press
relations changed noticeably. Helms himself had been a
reporter with United Press in Germany before World War
II, and he thought of himself as an accomplished journalist.
He would tell his subordinates, when the subject of the press
came up in the agency's inner councils, that he understood
reporters' problems, how their minds worked, what the CIA
could and could not do with them. He had certain writing
habits (which may have originated either with a strict bureau
chief or a strict high-school English teacher) which set him
apart from others in the clandestine part of the agency,
where writing is considered a functional, as opposed to a
literary, skill. For instance, he would not sign his name to
any document prepared for him that included a sentence
beginning with the words "however" or "therefore."
It soon became clear within the agency that Helms was
intent on taking care of most of the CIA's relations with the
press himself. Acutely aware that the agency's image had
been badly tarnished by the Bay of Pigs and other blown
operations during the early 1960s, he was determined to
improve the situation. He later told a congressional committee,
"In our society even a clandestine outfit cannot stray far
from the norms. If we get . . . the public, the press or the
Congress against us, we can't hack it."
So Helms began to cultivate the press. He started a series
of breakfasts, lunches, and occasional cocktail and dinner
parties for individual reporters and groups of them. On days
when he was entertaining a gathering of journalists, he would
often devote part of his morning staff meeting to a discus-
sion of the seating arrangements and make suggestions as to
310
The CIA and the Cult of Inielligence
which CIA official would be the most compatible eating
partner for which reporter. While a few senior clandestine
personnel were invited to these affairs, Helms made sure
that the majority came from the CIA's analytical and techni-
cal branches. As always, he was trying to portray the agency
as a predominantly non-clandestine organization.
Helms' invitations were not for every reporter. He concen-
trated on what the New York Times' John Finney calls the
"double-domes — the bureau chiefs, columnists, and other
opinion makers." David Wise, who headed the New York
Herald Tribune's Washington staff, has a similar impression:
"In almost every Washington bureau, there's one guy who
has access to the agency on a much higher level than the
press officer. Other reporters who call up get the runaround."
Finney states that Helms and his assistants would "work
with flattery on the prestige of these key journalists. CBS
News' Marvin Kalb, who attended several of Helms' sessions
with the press (and who was recently bugged by the Nixon
administration), recalls that Helms "had the capacity for
astonishing candor but told you no more than he wanted to
give you. He had this marvelous way of talking, of suggesting
things with his eyes. Yet, he usually didn't tell you anything."
Helms' frequent contact with reporters was not a sinister
thing. He was not trying to recruit them into nefarious
schemes for the CIA. Rather, he was making a concerted
effort to get his and his agency's point of view across to the
press and, through them, to the American public — a com-
mon activity among top government officials. Furthermore,
Helms was an excellent news source — for his friends. Colum-
nist Joseph Kraft (another Nixon-administration bugging
victim) generally sums up the view of Helms by reporters
who saw him frequently: "I wanted to see Helms a lot
because he was talking with the top men in government. He
was a good analyst — rapid, brief, and knowledgeable about
what was going on." Kraft recalls that Helms was the only
government official who forecast that South Vietnamese Presi-
dent Thieu would successfully block implementation of the
Vietnamese peace accords until after the 1972 American
election, and other reporters tell similar stories of Helms
being among the most accurate high government sources
available on matters like Soviet missiles or Chinese nuclear
testing. He did not usually engage in the exaggerated talk
Controlling the CIA
311
about communist threats that so often characterizes "informed
sources" in the Pentagon, and he seemed to have less of an
operational ax to grind than other Washington officials.
The source of a news leak is not usually revealed in the
newspapers. Yet when Helms, or any other government
official, gives a "not-for -attribution" briefing to reporters,
he always has a reason for doing so — which is not necessarily
based on a desire to get the truth out to the American
people. He may leak to promote or block a particular policy,
to protect a bureaucratic flank, to launch a "trial balloon,"
to pass a message to a foreign government, or simply to
embarrass or damage an individual. Most reporters are aware
that government officials play these games; nevertheless, the
CIA plays them more assiduously, since it virtually never
releases any information overtly. The New York Times Wash-
ington bureau chief, Clifton Daniel, notes that although the
agency issues no press releases, it leaks information "to
support its own case and to serve its own purposes. ... It
doesn't surprise me that even secret bureaucrats would do
that." Daniel says, however, that he "would accept material
not-for-attribution if the past reliability of the source is good.
But you have to be awfully careful that you are not being
used."
In early 1968, Time magazine reporters were doing re-
search on a cover story on the Soviet navy. According to
Time's Pentagon correspondent, John Mulliken, neither the
White House nor the State Department would provide infor-
mation on the subject for fear of giving the Soviets the
impression that the U.S. government was behind a move to
play up the threat posed by the Soviet fleet. Mulliken says
that, with Helms' authorization, CIA experts provided Time
with virtually all the data it needed. Commenting on the
incident Five years later, Mulliken recalls, "I had the impres-
sion that the CIA was saying 'the hell with the others' and
was taking pleasure in sticking it in." He never did find out
exactly why Helms wanted that information to come out at
that particular time when other government agencies did
not; nor, of course, did Time's readers, who did not even
know that the CIA was the source of much of the article
which appeared on February 23, 1968.
From the days of Henry Luce and Allen Dulles, Time had
always had close relations with the agency. In more recent
312
The CIA and the Cult of Intelligence
years, the magazine's chief Washington correspondent, Hugh
Sidey, relates, "With McCone and Helms, we had a set-up
that when the magazine was doing something on the CIA,
we went to them and put it before them. . . . We were never
misled."
Similarly, when Newsweek decided in the fall of 1971 to do
a cover story on Richard Helms and "The New Espionage,"
the magazine, according to a Newsweek staffer, went directly
to the agency for much of its information. And the article,
published on November 22, 1971, generally reflected the line
that Helms was trying so hard to sell: that since "the latter
1960s ... the focus of attention and prestige within CIA"
had switched from the Clandestine Services to the analysis of
intelligence, and that "the vast majority of recruits are bound
for" the Intelligence Directorate. This was, of course, writ-
ten at a time when over two thirds of the agency's budget
and personnel were devoted to covert operations and their
support (roughly the same percentage as had existed for the
preceding ten years). Newsweek did uncover several pre-
viously unpublished anecdotes about past covert operations
(which made the CIA look good) and published at least one
completely untrue statement concerning a multibillion-dollar
technical espionage program. Assuming that the facts for
this statement were provided by "reliable intelligence sources,"
it probably represented a CIA disinformation attempt de-
signed to make the Russians believe something untrue about
U.S. technical collection capabilities.
Under Helms, the CIA also continued its practice of inter-
vening with editors and publishers to try to stop publication
of books either too descriptive or too critical of the agency.
In April 1972 this book — as yet unwritten — was enjoined;
two months later, the number-two man in the Clandestine
Services, Cord Meyer, Jr., visited the New York offices of
Harper & Row, Inc., on another anti-book mission. The
publisher had announced the ' forthcoming publication of a
book by Alfred McCoy called The Politics of Heroin in
Southeast Asia, charging the agency with a certain degree of
complicity in the Southeast Asian drug traffic. Meyer asked
old acquaintances among Harper & Row's top management
to provide him with a copy of the book's galley proofs.
While the CIA obviously hoped to handle the matter infor-
mally among friends. Harper & Row asked the agency for
official confirmation of its request. The CIA's General
Conirolling the CIA
313
Counsel, Lawrence Houston, responded with a letter of July
5, 1972, that while the agency's intervention "in no way
affects the right of a publisher to decide what to publish . . .
I find it difficult to believe . . . that a responsible publisher
would wish to be associated with an attack on our Govern-
ment involving the vicious inter-national drug traffic without
at least trying to ascertain the facts." McCoy maintained that
the CIA had "no legal right to review the book" and that
"submitting the manuscript to the CIA for prior review
is to agree to take the first step toward abandoning the First
Amendment protection against prior censorship." Harper &
Row apparently disagreed and made it clear to McCoy that
the book would not be published unless first submitted.
Rather than find a new publisher at that late date, McCoy
went along. He also gave the entire story to the press, which
was generally critical of the CIA.
The agency listed its objections to Harper & Row on July
28, and, in the words of the publisher's vice president and
general counsel, B. Brooks Thomas, the agency's criticisms
"were pretty general and we found ourselves rather under-
whelmed by them." Harper & Row proceeded to publish the
book — unchanged — in the middle of August.
The CIA has also used the American press more directly
in its efforts against the KBG. On October 2, 1971, the week
after the British government expelled 105 Soviet officials
from England because of their alleged intelligence activities,
the New York Times ran a front-page article by Benjamin
Welles about Soviet spying around the world. Much of the
information in the article came from the CIA, and it
mentioned, among other things, that many of the Russians
working at the United Nations were KGB operators. Accord-
ing to Welles, the agency specifically "fingered as a KGB
man" a Russian in the U.N. press office, Vladimir P.
Pavlichenko, and asked that he be mentioned in the article.
Welles complied and included a paragraph of biographical
information on the Russian, supplied by the CIA. Ten days
later the Soviet Union made an official protest to the U.S.
government about the "slanderous" reports in the American
press concerning Soviet officials employed at the U.N.
The Times' charges about espionage activities of the Sovi-
ets at the U.N. were almost certainly accurate. But, as a
Washington-based media executive familiar with the case
states, "The truth of the charges has nothing to do with the
314
The CIA and the Cull of Inielligence
question of whether an American newspaper should allow
itself to become involved in the warfare between opposing
intelligence services without giving its readers an idea of
what is happening. If the CIA wants to make a public
statement about a Soviet agent at the U.N. or the U.S.
government wants to expel the spy for improper activities,
such actions would be legitimate subjects for press coverage —
but to cooperate with the agency in Tingering' the spy,
without informing the reader, is at best not straight-forward
reporting."
The CIA has often made communist defectors available to
selected reporters so news stories can be written (and propa-
ganda victories gained). As was mentioned earlier, most of
these defectors are almost completely dependent on the
CIA, and are carefully coached on what they can and cannot
say. Defectors unquestionably are legitimate subjects of the
press's attention, but it is unfortunate that their stories are
filtered out to the American people in such controlled
circumstances.
David Wise remembers an incident at the New York Her-
ald Tribune in the mid-1960s when the CIA called the paper's
top officials and arranged to have a Chinese defector made
available to reporters. According to Wise, CIA officials
"brought him down from Langley [for the interview] and
then put him back on ice." Similarly, in 1967 the agency
asked the Times' Welles to come out to CIA headquarters to
talk to the Soviet defector Lieutenant Colonel Yevgeny
Runge. On November 10 Welles wrote two articles based on
the interview with Runge and additional material on the
KGB supplied by CIA officers. But Welles also included in
his piece several paragraphs discussing the CIA's motivation
in making Runge available to the press. The article men-
tioned that at least some U.S. intelligence officials desired
"to counter the international attention, much of it favorable,
surrounding the Soviet Union's 50th anniversary," which was
then taking place. Publicizing the defection, Welles continued,
"also gave United States intelligence men a chance to focus
public attention on what they consider a growing emphasis
on the use of 'illegal' Soviet agents around the world."
According to Welles, these paragraphs stating, in effect,
that the CIA was exploiting Runge's defection for its own
purposes infuriated the agency, and he was "cut off by his
CIA sources. He experienced "long periods of coolness"
Coturolling the CIA
315
and was told by friends in the agency that Helms had person-
ally ordered that he was to be given no stories for several
months.
The CIA is perfectly ready to reward its friends. Besides
provision of big news breaks such as defector stories, se-
lected reports may receive "exclusives" on everything from
U.S. government foreign policy to Soviet intentions. Hal
Hendrix, described by three different Washington reporters
as a known "friend" of the agency, won a Pulitzer Prize for
his 1962 Miami Daily News reporting of the Cuban missile
crisis.* Much of his "inside story" was truly inside: it was
based on CIA leaks.
Because of the CIA's clever handling of reporters and
because of the personal views held by many of those report-
ers and their editors, most of the American press has at least
tacitly gone along, until the last few years, with the agency
view that covert operations are not a proper subject for
journalistic scrutiny. The credibility gap arising out of the
Vietnam war, however, may well have changed the attitude
of many reporters. The New York Times' Tom Wicker
credits the Vietnam experience with making the press
"more concerned with its fundamental duty." Now that
most reporters have seen repeated examples of government
lying, he believes, they are much less likely to accept CIA
denials of involvement in covert operations at home and
abroad. As Wicker points out, "Lots of people today would
believe that the CIA overthrows governments," and most
journalists no longer "believe in the sanctity of classified
material." In the case of his own paper, the New York
Times, Wicker feels that "the Pentagon Papers made the big
difference."
The unfolding of the Watergate scandal has also opened
up the agency to increased scrutiny. Reporters have dug
deeply into the CIA's assistance to the White House
"plumbers" and the attempts to involve the agency in the
Watergate cover-up. Perhaps most important, the press has
largely rejected the "national security" defense used by the
White House to justify its actions. With any luck at all, the
'This is the same Hal Hendiix who later joined ITT and sent the memo
saying President Nixon had given (he "green lighl" For covert U.S. interven-
tion in Chile. See p. 3(X).
316
The CIA and the Cull of Intelligence
American people can look forward to learning from the
news media what their government — even its secret part — is
doing. As Congress abdicates its responsibility, and as the
President abuses his responsibility, we have nowhere else to
turn.
11.
CONCLUSIONS
In the eyes of posterity it will inevitably seem that ,
in safeguarding our freedom, we destroyed it: that
the vast clandestine apparatus we built up to probe
our enemies' resources and intentions only served
in the end to confuse our own purposes, that the
practice of deceiving others for the good of the
state led infallibly to our deceiving ourselves: and
that the vast army of intelligence personnel built
up to execute these purposes were soon caught up
in the web of their own sick fantasies, with disas-
trous consequences to them and us.
— MALCOLM MUCCnRIDCF.
May 1966
"It is a multi-purpose, clandestine arm of power . . . more
than an intelligence or counterintelligence organization. It is
an instrument for subversion, manipulation, and violence,
for the secret intervention in the affairs of other countries."
Allen Dulles wrote those words about the KGB in 1963 so
that Americans would better understand the nature of the
Soviet security service. His description was a correct one,
but he could — just as accurately — have used the same terms
to describe his own CIA. He did not, of course, because
the U.S. leaders of Dulles' generation generally tried to
impute the worst possible methods and motives to the forces
of international communism, while casting the "defensive
actions of the free world" as honest and democratic. Both
sides, however, resorted to ruthless tactics. Neither was re-
luctant to employ trickery, deceit, or, in Dulles' phrase,
"subversion, manipulation, and violence." They both oper-
ated clandestinely, concealing their activities not so much
from the "opposition" (they couldn't) as from their own
peoples. Secrecy itself became a way of life, and it could not
be challenged without fear of a charge that one was unpatri-
otic or unmindful of the "national security."
318
The CIA and the Cull of Intelligence
In the dark days of the Cold War the communist threat
was real to most Americans. Sincere men believed that the
enemy's dirtiest tricks must be countered. Fire was to be
fought with fire, and America's small tWxc corps of intelli-
gence professionals claimed they knew how to do this. The
public and the country's leader.s were willing to go along, if
not always enthusiastically, at least without serious opposition.
Consequently, clandestine operatives from the United States
as well as the Soviet Union were turned loose in virtually
every nation in the world. Each side won secret victories,
but the overall results were decidedly mixed. For its part,
the CIA played some role in forestalling a communist take-
over of Western Europe, but the agency's record in the
Middle East, Asia, and elsewhere in the world left much to
be desired.
When the CIA's invaders were defeated in 1961 on the
beaches of the Bay of Pigs, it should have been a signal to
the country that something was wrong — both with the CIA
and the government that directed the secret agency's activities.
It should have been clear that events in the Third World
could (and should) no longer be easily and blatantly manipu-
lated by Washington. It should have been obvious that the
times were rapidly changing; that the fears, following on the
heels of World War II, that the "communist monolith" was
on the verge of dominating the "free world" were invalid. It
should have been apparent to the American public that the
CIA was living in the past.
Columnist Tom Braden, a former high-ranking CIA co-
vert expert, reflecting on the latter-day life of the CIA,
wrote in January 1973: "Josef .Stalin's decisi on to attem pt
^onyuMt^ Western F.u nipe by manipulation, the use of tronts
and the purc:ha5ir]£,QQovaliv turn ed ihe Aeency into a t^ouse
of JTr iy lujlts. It was necessary. A bsolutely necessa ry, injny
view. B uj it lasted long "aTlfrfTHe ne cessity w as gone."""
Yet after ^e initial puSTTc outcry over tne" Cuban fiasco,
the personnel shake-up at the agency and the high-level
reviews of its performance ordered by President Kennedy
had little effect. The CIA went back to operating essen-
tially the same way it had for the previous decade, again
with at least the tacit acceptance of the American public.
Not until the Indochinese war shocked and outraged a signifi-
cant part of the population were the CIA's tactics, such as
secret subsidies, clandestine armies, and covert coups, seri-
Conclusions
319
ously called into question. Now Watergate has brought the
issue of an inadequately controlled secret intelligence agency
home to us. The clandestine techniques developed over a
quarter-century of Cold War have, at last, been dramatically
displayed for the people of this country, and the potential
danger of a CIA which functions solely at the command of
the President has been demonstrated to the public.
The CIA has a momentum of its own, and its operatives
continue to ply their trade behind their curtain of secrecy.
They do not want to give up their covert activities, their
dirty tricks. They believe in these methods and they rather
enjoy the game. Of course, without a presidential mandate
they would have to stop, but the country has not had a chief
executive since the agency's inception who has not believed
in the fundamental need and rightness of CIA intervention
in the internal affairs of other nations. When a President has
perceived American interest to be threatened in some far-
away land, he has usually been willing to try to change the
course of events by sending in the CIA. That these covert
interventions often are ineffective, counterproductive, or dam-
aging to the national interest has not prevented Presidents
from attempting them.
"/ don't see why we need to stand by and watch a country
go Communist due to the irresponsibility of its own people,"
declared Henry Kissinger at a meeting authorizing, with the
concurrence of President Nixon, the ultimately unsuccessful
CIA interference in the 1970 Chilean elections. Kissinger and
Nixon were concerned with what they believed to be a
legitimate end — preventing a Marxist from being elected
President of Chile — and the means employed mattered little
to them, as long as secrecy could be maintained.
The New CIA Director, William Colby, has indicated on
the public record that he intends to keep the agency function-
ing largely as it has in the past (while pledging to shun future
"Watergates"). When Senator Harold Hughes asked him
where the line should be drawn between the use of CIA
paramilitary warriors and the regular U.S. armed forces,
Colby replied that the dividing line should be "at the point
in which the United States acknowledges involvement in
such activities." Senator Hughes specifically put this answer
into perspective when he said on August 1, 1973, "Mr. Colby
320 The CIA and the Cult of Intelligence
believes that CIA-run military operations are perfectly ac-
ceptable as long as they can be concealed."
Colby's — and the CIA's and the Nixon administration's —
view that "deniability" somehow allows the United States a
free hand for covert intervention abroad (and at home) is an
anachronistic hangover from the Cold War. Perhaps such
actions could once have been justified when the future of the
country was seemingly at stake, but no such threat now
looms on the horizon. The only two foreign powers with the
potential to threaten the United States — the Soviet Union
and China — have long ceased to be meaningful targets of
CIA secret operations. Instead, the agency works mainly in
the Third World, in nations that pose no possible threat to
Americiin security, in Chile, the Congo. Iran, . . . Cambodia,
Laos. Vietnam, the Philippines.)
The CIA is not defending our national security. It seeks
rather to maintain the status quo, to hold back the cultural
clock, in areiis that are of Tittle or no significance to the
American people. These efforts are often doomed to failure.
In fact, at least since 1961. the CIA has lost many more
battles than it has won, even by its own standards. Further-
more, the very fact that the United States 0)ierates an active
CIA around the world has done incalculable harm to the
nation's international position. Not only have millions of
people abroad been alienated by the CIA's activities, but so
have been a large number of Americans, especially young
people.
The time has come for the United States to stand openly
behind its actions overseas, to lead by example rather than
manipulation. The changeover might disturb those govern-
ment officials who believe in the inherent right of the United
States to exercise its power everywhere, clandestinely when
that seems necessary; but in the long run non-interference
and forthrightness would enhance America's international
prestige and position.
Even in an era when the public is conditioned to ever
expanding and ever more expensive government activities,
the S6 billion yearly cost of American intelligence represents
a significant slice of the national treasury. The government
spends more money on the various forms of spying than it
does on the war against crime and drugs, community devel-
opment and housing, mass transportation systems, and even
the country's overt international programs carried out by the
Concliuions
321
State Department, the USIA, and the AID combined. Yet,
unlike other federal activities, information on the intelli-
gence community — how much money is being spent and
where the money goes — is systematically withheld from the
American people and all but a handful of Congressmen.
Behind this wall of secrecy (which exists as much to conceal
waste and inefficiency as to protect "national security") intel-
ligence has grown far beyond the needs of the nation.
The time has come to demysticize the intelligence profres-
sion, to disabuse Americans of the ideas that clandestine
agents somehuw make the world a safer place to live in, that
excessive secrecy is necessary to protect the national security.
These notions simply are not true; the CIA and the other
intelligence agencies have merely used them to build their
own covert empire. The U.S. intelligence community per-
forms a vital service in keeping track of and analyzing the
military capability and strengths of the Soviet Union and
China, but its other functions — the CIA's dirty tricks and
classical espionage — are, on the whole, a liability for the
country, on both practical and moral grounds.
But because of bureaucratic tribalism, vested interests,
and the enormous size of the intelligence community, inter-
nal reform never makes more than a marginal dent in the
community's operations. The people in charge like things
essentially as they are, and they have never been subjected
to the kind of intense outside pressure which leads to change
in our society. Presidents, furthermore, have not wanted to
greatly disturb the existing system because they have always
wanted more, if not better, intelligence; because they were
afraid of opening up the secret world of intelligence to
public scrutiny; because they did not want to risk losing their
personal action arm for intervention abroad.
The Congress, which has the constitutional power and,
indeed, the responsibility to monitor the CIA and U.S.
intelligence, has almost totally failed to exercise meaningful
control. Intelligence has always been the sacred shibboleth
which could not be disturbed without damaging the "national
security," and, despite loud protests from a few outspoken
critics, neither legislative house has been willing to question
seriously the scope or the size of intelligence activities. Yet,
if there is to be any real, meaningful change in the intelli-
gence community, it must come from Congress, and, judging
from past experience. Congress will act only if prodded by
322
The CIA and the Cult of Inielligence
public opinion. The Watergate affair has, to some extent,
played such a role, and the full review of the CIA's secret
charter promised by Senate Armed Services chairman John
Stennis should be the first step in limiting the CIA's covert
operations and cutting down the duplication and inefficiency
of the rest of the community.
Congress should require the various intelligence agencies
to keep it informed of the information collected. This kind
of data should be routinely supplied to the legislative branch
so it can properly carry out its foreign policy functions and
vote funds for the national defense. If the same information
can be given to foreign governments and selectively leaked to
the press by administrations in search of votes on military-
spending issues, then there is no "security" reason why it
must be denied to the Congress. The Soviets know that U.S.
spy satellites observe their country and that other electronic
devices monitor their activities; it makes little sense to clas-
sify the intelligence gathered "higher than top secret." No
one is asking that technical details such as how the cameras
work be given to the Congress or made public — but the
excessive secrecy which surrounds the finished intelligence
product could certainly be eased without in any way limiting
the nation's ability to collect raw intelligence data by techni-
cal means.
As for the CIA proper. Congress should take action to
limit the agency to the role originally set out for it in the
National Security Act of 1947 — naf p^ y, i/ie CI A s houl d con -
ce^ itself excl usj^vej^ wi_th cQ Ofdin atipg..an J evajuannjE
mtelTi^ence" ^^nh t: minim um, if clande sjins ac^j vitT^ mu st
he continued ^yemni^iii^^lif: jJEcralTonal^^arl
ofTWCiA should be separated from the noncove fTcom-
ponents. In the analytical and technical field tfTe agency can
make'its most important contribution to the national security,
but these functions have been neglected and at times dis-
torted by the clandestine operatives who have almost always
been in control of the CIA. Intelligence should not be pre-
sented to the nation's policy-makers by the same men who
are trying to justify clandestine operations. The temptation
to use field information selectively and to evaluate informa-
tion to serve operational interests can be irresistible to the
most honest men — let alone to the clandestine operatives.
However, the best solution would be not simply to sepa-
rate the Clandestine Services from the rest of the CIA, but
Conclusions
323
to abolish them completely. The few clandestine functions
which still serve a useful purpose could be transferred to
other government departments, but. for the most part, such
activities should be eliminated. This would deprive the gov-
ernment of its arsenal of dirty tricks, but the republic could
easily sustain the loss — and be the better for it.
The Clandestine Services' espionage operations using hu-
man agents have already been made obsolete by the techni-
cal collection systems which , along with open sources, supply
the United States government with almost ail the informa-
tion it needs on the military strength and deployments of the
Soviet Union and China. The truly valuable technical
systems — the satellites and electronic listening devices — should
be maintained, although without the present duplication and
bureaucratic inefficiency. Since Oleg Penkovsky's arrest by
Soviet authorities in 1962, there has been no CIA spy who
has supplied the United States with important information
about any communist power, and it is difficult to justify the
expenditure of over SI billion in the last decade for classical
espionage simply on the hope that another Penkovsky will
someday offer himself up as a CIA agent. Assuming that the
CIA's most valuable agents will continue to be volunteers —
"walk-ins" and defectors — a small office attached to the
State Department and embassy contacts could be established
to receive the information supplied by these sources.
While the CIA has been much more successful in penetrat-
ing the governments of the Third World and some of
America's allies, the information received is simply not that
important and can be duplicated to some extent through
diplomatic and open sources. While it might be interesting
to know about the inner workings of a particular Latin
American, Asian, or African country, this intelligence has
little practical use if the CIA has no intention of manipulating
the local power structure.
The Clandestine Services' counterespionage functions should
be taken over by the FBI. Protecting the United States
against foreign spies is supposed to be the bureau's function
anyway, and the incessant game-playing with foreign intelli-
gence services — the provocations, deceptions, and double
agents — ^would quickly become a relic of the past if the CIA
were not involved in its own covert operations. Playing chess
with the taxpayers' money against the KGB is unquestiona-
bly a fascinating exercise for clandestine operatives, but one
324
The CIA and the Cult of Intelligence
that can properly be handled by the internal-security agency
of the United States, the FBI.
As for the CIA's paramilitary tasks, they have no place in
an intelligence agency, no place in a democratic society.
Under the Constitution, only Congress has the power to
declare war, and the United States should never again be-
come involved in armed conflict without full congressional
approval and public knowledge. If "American advisors" are
needed to assist another country legitimately, they can be
supplied by the Pentagon. The other forms of covert action —
propaganda, subversion, manipulation of governments — should
simply be discontinued. These are more often than not coun-
terproductive and, even when successful, contrary to the
most basic American ideals. The CIA's proprietary compa-
nies should be shut down or sold off. The agency would have
little use for one of the largest aircraft networks in the world
if it were not constantly intervening in foreign countries. The
proprietaries, with their unregulated profits, potential con-
flicts of interest, and doubtful business practices, should in
no case be allowed to continue operations.
The other countries of the world have a fundamental right
not to have any outside power interfere in their internal
affairs. The United States, which solemnly pledged to up-
hold this right when it ratified the United Nations charter,
should now honor it. The mechanisms used to intervene
overseas ignore and undermine American constitutional pro-
cesses and pose a threat to the democratic system at home.
The United States is surely strong enough as a nation to be
able to climb out of the gutter and conduct its foreign policy
in accordance with the ideals that the country was founded
upon.
APPENDIX
APPENDIX
THE BISSELL PHILOSOPHY
Minutes or the 1968 "Bissell Meeting" at the Coun-
cil on Foreign Relations as reprinted by the Africa
Research Group
The third meeting of the Discussion Group on Intelligence
and Foreign Policy was held at the Harold Pratt House on
January 8, 1968, at 5:00 p.m. Present were: Richard M.
Bissell, Jr., Discussion Leader; Douglas Dillon, Chairman;
William J. Barnds, Secretary; William R. Harris, Rapporteur;
George Agree, Frank Allschut, Robert Amory, Jr., Meyer
Bernstein, Col. Sidney B. Berry, Jr., Allen W. Dulles, George
S. Franklin, Jr., Eugene Fubini, Juliiis C. Holmes, Thomas
L. Hughes, Joseph Kraft, David W. MacEachron, Philip W.
Quigg, Harry Howe Ransom, Theodore C. Sorensen, David
8. Truman.
The Chairman, Mr. Dillon, opened the meeting, noting that
although this entire series of discussion was "off-the-record,"
the subject of discussion for this particular meeting was
especially sensitive and subject to the previously announced
restrictions.
Mr. Dillon noted that problems involving CIA's relation-
ships with private institutions would be examined at a later
meeting, though neither Mr. Bissell nor others should feel
restricted in discussion of such problems this evening.
As the session's discussion leader, Mr. Bissell offered a
review and appraisal of covert operations in U.S. foreign
policy.
Touching briefly upon the question of responsibility, of
whether these agencies are instruments of national policy,
Mr. Bissell remarked that, in such a group, he needn't
elaborate on CIA's responsiveness to national policy; that
we could assume that, although CIA participates in policy
making (as do other "action agencies," such as AID, the
military services and Departments, in addition to the Depart-
328
The CIA and the Cut{ of Intelligence
ment of State), CIA was a re!>pdnsible agency of national
policy.
Indeed, in Mr. Bissell's personal experience, CIA's role
was more carefully circumscribed and the established limits
observed more attentively than in ECA, where Mr. Bissell
had previously worked.
The essential control of CIA resided in a Cabinet-level
committee, comprising a representative of the White House
staff, the Under Secretary of State, Deputy Secretary of
Defense, and in recent years the personal participation of
the Director of Central Intelligence. Over the years this
committee has become a more powerful and effective device
for enforcing control. It reviews all new projects, and periodi-
cally scrutinizes ongoing projects.
As an interdepartmental committee composed of busy
officials who meet only once per week, this control group is
of limited effectiveness. Were it the only control instrument,
Mr. Bissell would view it as inadequate, but in fact this
committee is merely the summit of control, with a series of
intermediate review procedures as lower levels. Projects are
usually discussed in the relevant office of the Assistant Secre-
tary of State, and, if at all related to Defense Department
interests, at a similar level in DoD, frequently after consider-
ation at lower levels in these departments. It was rare to
take an issue before the Special Group prior to discussion at
lower levels, and if there was objection at lower levels, most
issues were not proposed to the Special Group — excepting
large projects or key issues, which would be appealed at
every level, including the Special Group.
Similar procedures applied in the field. Generally the Am-
bassador had a right to know of any covert operations in his
jurisdiction, although in special cases (as a result of requests
from the local Chief of State or the Secretary of State) the
chief of station was instructed to withhold information from
*the Ambassador. Indeed, in one case the restriction was
imposed upon the specific exhortation of the Ambassador in
question, who preferred to remain ignorant of certain
activities.
Of the "blown" operations, frequently among the larger
ones, most are known to have been approved by the Presi-
dent himself. The U-2 project, for example, was an off-shoot
of the Land (intelligence) Committee of the Killian panel on
surprise attack; it was proposed as a Killian panel recommen-
Appendix
329
dation to the President, supported by USIB; its procurement,
in utmost secrecy, was authorized by the President, and,
with the exception of the first few flights (the initial authori-
zation being to operate for a period of ten days, "weather
permitting"), each individual flight was authorized by the
President, with participation by the Secretary of State and
Secretary of Defense.
Covert operations should, for some purposes, be divided
into two classifications: (1) Intelligence collection, primarily
espionage, or the obtaining of intelligence by covert means;
and (2) Coven action, attempting to influence the internal
affairs of other nations — sometimes called "intervention" — by
covert means.
Although these two categories of activity can be separated
in theory, intelligence collection and covert action interact
and overlap. Efforts have been made historically to separate
the two functions but the result has usually been regarded as
"a total disaster organizationally." One such attempt was
the establishment in the early days of CIA (1948) of the OPC
under Frank G. Wisner as a separate organ for covert action.
Although supported and given cover by the CIA, this organi-
zation was independent and Wisner reported directly to the
Secretaries of State and Defense. "Beedle" Smith decided
when he became Director of Central Intelligence that, if he
were responsible for OPC, he was going to run it and it was
merged with the clandestine intelligence organization in such
a way that within the combined Clandestine Services there
was a complete integration of intelligence collection and
covert action functions in each area division.
In addition to our experience with OPC, the Germans and
the British for a time during the war had organizations for
covert special operations separate from, and inevitably in
competition with, their espionage services. In every case the
experience has been unfortunate. Although there are many
disagreements within CIA on matters of doctrine, the view is
unanimous that the splitting of intelligence and covert action
services would be disastrous, with resulting competition for
recruitment of agents, multiple recruitment of the same agents,
additional security risks, and dissipation of effort.
Concerning the first category, intelligence collection, we
should ask: (a) What is the scope of "covert intelligence
collection"? (b) What intelligence collection functions can
best be performed covertly?
330
The CIA and the Cull of Inielligence
The scope of covert intelligence collection includes: (1)
reconnaissance; (2) communications and electronic intelli-
gence, primarily undertaken by NSA; and (3) classical
espionage, by agents. In gauging their utility, Mr. Bissell
ranked (1) the most important, (2) slightly below, and (3)
considerably below both (1) and (2).
Although it is less effective, classical espionage is "much
the least costly," with the hardware components of recon
and NSA activities raising their costs considerably.
(In the after-dinner discussion, an authority on communi-
cations-electronics expressed his concurrence in Mr. Bissell's
relative rankings. Notwithstanding technological advances in
cryptology, the increased sophistication in most cryptosystems
assured that (1) (reconnaissance) outranked (2). Another
observer noted that the budgets correlated in similar manner,
the former speaker concurring and noting that, however
surprising, the budgets approximated maximum utility ac-
cording to cost-effectiveness criteria.)
Postwar U.S. reconnaissance operations began, historically,
as "covert" operations, primarily a series of clandestine over-
flights of Communist territory in Eastern Europe, inaugu-
rated in the early 19SUs. These early efforts were followed by
the U-2 project, which provided limited coverage but dra-
matic results.
Now we have reconnaissance satellites. Overhead recon-
naissance is one of the most open of "secrets" in interna-
tional affairs; it is no longer really a "covert activity," and
bureaucratic responsibility for it now resides in the Pentagon.
Classical espionage, in the early postwar years, was con-
ducted with special intensity in West Germany, and before
the Berlin wall, in that city, which was ideal for the moving
of agents in both directions, providing a sizable flow of
political and economic intelligence (especially from East
Germany).
Throughout the period since the early fifties, of course,
the Communist bloc, and more especially the U.S.S.R. itself,
has been recognized as the primary target for espionage
activities. Circumstances have greatly limited the scale of
operations that could be undertaken within the bloc so much
of the effort has been directed at bloc nationals stationed in
neutral or friendly areas, and at "third country" operations
that seek to use the nationals of other non-Communist coun-
tries as sources of information on the Soviet bloc.
Appendix
331
More recently there has been a shift in priorities for classi-
cal espionage toward targets in the underdeveloped world.
Partly as a result of this change in priorities and partly
because of other developments, the scale of the classical
espionage effort mounted in Europe has considerably dimin-
ished. The U.S.S.R. remains a prime target but Communist
China would today be given the same priority.
As to the kinds of information that could be obtained,
espionage has been of declining relative importance as a
means of learning about observable developments, such as
new construction, the characteristics of transportation systems,
the strength and deployment of military forces and the like
because reconnaissance has become a far more effective
collection technique and (except in China) travel is freer and
far more extensive than some years ago. It had been hoped
that espionage would contribute to the collection of intelli-
gence on Soviet and East European technology, since this is
a body of information not readily observable (until embod-
ied in operational systems). Another type of intelligence for
which espionage would seem to be the only available tech-
nique is that concerning enemy intentions. In practice how-
ever espionage has been disappointing with respect to both
these types of intelligence. They are for obvious reasons
closely guarded and the task is just too difficult to permit
results to be obtained with any dependability or regularity.
With respect to the former category — technology — the pub-
lished literature and direct professional contacts with the
scientific community have been far richer sources.
(A communications-electronics expert interjected the ob-
servation that the same reasoning applied to inadequacies in
S&T intelligence collection; technology is just too difficult
for agents, who are insufficiently trained to comprehend
what they observe as the technologies become increasingly
complicated.)
As to friendly neutrals and allies, it is usually easier to
learn what one wishes by overt contacts, human contacts of
overt members of the U.S. mission or private citizens. We
don't need espionage to learn British, or even French
intentions.
(The speaker was questioned as to whether the other
side's espionage was of similarly limited utility, or whether —
with their Philbys — they were more successful?)
Mr. Bissell remarked that Soviet Union successes were
332
The CIA and the Cull of Intelligence
primarily in counterintelligence, though going back aways,
the Soviet Union had been more successful in recruiting
U.S. scientists.
(The question was raised as to whether Burgess and
MacLean constituted merely C.I. successes.)
Mr. Bissell thought so.
(In another's recollection, Soviet atomic intelligence ef-
forts had been of substantial assistance in facilitating the
Soviet nuclear weapons program. Although it is not possible
to estimate with precision the effects of this intelligence, it
was Lewis Strauss's guess that atomic intelligence successes
allowed the Soviets to detonate their first device at least one
and one-half and perhaps as much as two and one-half years
before such a test would have been possible with purely
indigenous efforts.)
The general conclusion is that against the Soviet bloc or
other sophisticated societies, espionage is not a primary source
of intelligence, although it has had occasional brilliant suc-
cesses (like the Berlin Tunnel and several of the high level
defectors). A basic reason is that espionage operates mainly
through the recruitment of agents and it is enormously diffi-
cult to recruit high level agents. A low level agent, even
assuming thut he remained loyal and that there is some
means of communicating with him[,| simply cannot tell you
much of what you want to know. The secrets we cannot find
out by reconnaissance or from open sources are in the minds
of scientists and senior policy makers and are not accessible
to an ordinary citizen even of middle rank.
In contrast, the underdeveloped world presents greater
opportunities for covert intelligence collection, simply be-
cause governments are much less highly oriented; there is
less security consciousness; and there is apt to be more
actual or potential diffusion of power among parties, localities,
organizations, and individuals outside of the central govern-
ments. The primary purpose of espionage in these areas is to
provide Washington with timely knowledge of the internal
power balance, a form of intelligence that is primarily of
tactical significance.
Why is this relevant?
Changes in the balance of power are extremely difficult to
discern except through frequent contact with power elements.
Again and again we have been surprised at coups within the
military; often, we have failed to talk to the junior officers
Appendix
333
or non-coms who are involved in the coups. TTie same prob-
lem applies to labor leaders, and others. Frequently we
don't know of power relationships, because power balances
are murky and sometimes not well known even to the princi-
pal actors. Only by knowing the principal players well do
you have a chance of careful prediction. There is real scope
for action in this area; the technique is essentially that of
"penetration," including "penetrations" of the sort which
horrify classicists of covert operations, with a disregard for
the "standards" and "agent recruitment rules." Many of the
"penetrations" don't take the form of "hiring" but of estab-
lishing a close or friendly relationship (which may or may
not be furthered by the provision of money from time to
time).
In some countries the CIA representative has served as a
close counselor (and in at least one case a drinking companion)
of the chief of state. These are situations, of course, in which
the tasks of intelligence collection and political action over-
lap to the point of being almost indistinguishable.
(The question was raised as to why ordinary diplomats
couldn't maintain these relationships.)
Mr. Bissell observed that often they could. There were
special cases, however, such as in one Republic where the
chief of state had a "special relationship" with the senior
CIA officers without the knowledge of the U.S. Ambassador
because the President of the Republic had so requested it.
The CIA man sent reports by CIA channels back to the
Secretary of State, but the Ambassador in the field, as
agreed by the Secretary of State, wasn't to be informed. In
his case, a problem arose when the relevant Assistant Secre-
tary of State (who had received cables from the CIA man)
became the new Ambassador, but the President of the Re-
public liked the new Ambassador and asked that a "special
relationship" be established with him too.
Aside from this unique case, it seems to have been true
generally that the Ambassador has to' be a formal representa-
tive of the United States most of whose relations with the
government to which he is accredited are through or with
the knowledge of its foreign office. On the other hand, the
CIA representative can maintain a more intimate and infor-
mal relationship the privacy of which can be better pre-
served both within the government of the country in question
and within the United States government. Moreover, if a
334
The CIA and the Cu!i of Intelligence
chief of state leaves the scene or changes his mind, you can
quietly move a station chief, but it could be embarrassing if it
were necessary suddenly to recall the U.S. Ambassador.
(Was the previously described relationship really a "covert
operation"?)
The "cover" may be to shield visibility from some junior
officials, or. in the case of a "private adviser" to a chief of
state, to shield this fact from politicians of the local
government.
(Another observation was that the method of reporting,
through CIA channels, constituted one difference and had
some influence. A chief of state who knew that CIA's
reports would be handled in a smaller circle, with less
attendant publicity, might prefer these channels for some
communications.)
Concerning the second category, coven action:
The scope of covert action could include: (1) political
advice and counsel; (2) subsidies to an individual; (3) finan-
cial support and "technical assistance" to political parties;
(4) support of private organizations, including labor unions,
business firms, cooperatives, etc.; (5) covert propaganda; (6)
"private" training of individuals and exchange of persons;
(7) economic operations; and (8) para-military [or] political
action operations designed to overthrow or to support a
regime (like the Bay of Pigs and the programs in Laos).
These operations can be classified in various ways: by the
degree and type of secrecy required [,] by their legality,
and, perhaps, by their benign or hostile character.
From whom is the activity to be kept secret? After five
days, for example, the U-2 flights were not secret from the
Russians but these operations remained highly secret in the
United States, and with good reason. If these overflights had
"leaked" to the American press, the U.S.S.R. would have
been forced to take action. On a less severe level the same
problem applies to satellite reconnaissance. These are exam-
ples of two hostile governments collaborating to keep opera-
tions secret from the general public of both sides. "Unfor-
tunately, there aren't enough of these situations."
(The remark was interjected that there was another rea-
son for secrecy; if one had to admit to the activity, one
would have to show the results, and exactly how good or bad
they were.)
Appendix
335
Covert operations could be classified by their legality or
illegality. Many of them are legal.
TTiey can also be classified as "benign" or "hostile." Most
operations in Western Europe have been "benign," though
involving the gravest improprieties, and in some cases clearly
illegal action. (E.g., covert support of political parties.)
I n the case of a large underdeveloped country, for example,
money was put into a party's funds without the knowledge of
that party. The relatively few economic operations that have
been undertaken have been both ^enign and legal. One of
these involved the provision by CIA of interim ostensibly
private financing of an overt project pending an overt and
official loan by AID. Its purpose was to give AID time for
some hard bargaining without causing a complete failure of
the transaction. The stereotype, of course, is that all covert
operations are illegal and hostile, but this is not really the
case.
The role of covert intervention can best be understood by
contrast with the overt activities of the United States
government. Diplomacy seeks results by bargaining on a
government-to-government basis, sometimes openly — some-
times privately. Foreign economic policy and cultural pro-
grams seek to modify benignly the economics of other coun-
tries and the climate of opinion within them. Covert inter-
vention is usually designed to operate on the internal power
balance, often with fairly short-term objectives in view. An
effort to build up the economy of an underdeveloped coun-
try must be subtle, long continued, probably quite costly,
and must openly enlist the cooperation of major groups
within the country if it is to have much influence. On the
other hand an effort to weaken the local Communist party
or to win an election, and to achieve results within at most
two or three years, must obviously be covert, it must prag-
matically use the people and the instrumentalities that are
available and the methods that seem likely to work. It is not
surprising that the practitioners within the United States
government of these two types of intervention differ temper-
amentally and in their preferences for methods, friends, and
ideologies.
The essence of such intervention in the internal power
balance is the identification of allies who can be rendered
more effective, more powerful, and perhaps wiser through
covert assistance. Typically these local allies know the source
336
The CIA and the Cult of Intelligence
of the assistance but neither they nor the United States
could afford to admit to its existence. Agents for fairly
minor and low sensitivity interventions, for instance some
covert propaganda and certain economic activities, can be
recruited simply with money. But for the larger and more
sensitive interventions, the allies must have their own
motivation. On the whole the Agency has been remarkably
successful in finding individuals and instrumentalities with
which and through which it could work in this fashion.
Implied in the requirement for a pre-existing motivation is
the corollary that an attempt to induce the local ally to follow
a course he does not believe in will at least reduce his
effectiveness and may destroy the whole operation. It is
notably true of the subsidies to student, labor, and cultural
groups that have recently been publicized that the Agency's
objective was never to control their activities, only occasion-
ally to point them in a particular direction, but primarily to
enlarge them and render them more effective.
Turning to relations with other agencies, Mr. Bissell was
impressed by the degree of improvement in relations with
the State Department. Seen from the Washington end, there
has been an increase in consultation at the country-desk
level, more often at the Bureau level or the Assistant Secre-
tary of State level as the operation shapes up. The main
problem some five to six years ago was not one of responsi-
bility or authority but of cover arrangements.
Mr. Bissell provided a brief critique of covert operations,
along the following lines:
That aspect of the Agency's operations most in need of
change is the Agency's use and abuse of "cover." In this
regard, the "background paper" for this session raised many
cover-oriented questions.
On disclosure of private institutional support of late, it is
very clear that we should have had greater compartmenting
of operations.
If the Agency is to be effective, it will have to make use of
private institutions on an expanding scale, though those rela-
tions which have "blown" cannot be resurrected.
We need to operate under deeper cover, with increased
attention to the use of "cut-outs." CIA's interface with the
rest of the world needs to be better protected.
If various groups hadn't been aware of the source of their
Appendix
337
funding, the damage subsequent to disclosure might have
been far less than occurred.
The CIA interface with various private groups, including
business and student groups, must be remedied.
The problem of Agency operations overseas is frequently
a problem for the State Department. It tends to be true that
local allies find themselves dealing always with an American
and an official American — since the cover is almost invaria-
bly as a U.S government employee. There are powerful
reasons for this practice, and it will always be desirable to
have some CIA personnel housed in the Embassy compound,
if only for local "command post" and communications
requirements.
Nonetheless, it is possible and desirable, although difficult
and time-consuming, to build overseas an apparatus of unof-
ficial cover. This would require the use or creation of private
organizations, many of the personnel of which would be
non-U. S. nationals, with freer entry into the local society
and less implication for the official U.S. posture.
The United St.ites should make increasing use of non-
nationals, who, with effort at indoctrination and training,
should be encouraged to develop a second loyalty, more or
less comparable to that of the American staff. As we shift
our attention to Latin America, Asia, and Africa, the con-
duct of U.S. nationals is likely to be increasingly circumscribed.
The primary change recommended would be to build up a
system of unofficial cover; to see how far we can go with
non-U. S. nationals, especially in the field. The CIA might
be able to make increasing use of non-nationals as "career
agents," that is, with a status midway between that of the
classical agent used in a single compartmented operation
perhaps for a limited period of time and that of a staff
member involved through his career in many operations and
well informed of the Agency's capabilities. Such career agents
should be encouraged with an effort at indoctrination and
training and with a prospect of long-term employment to
develop a second loyalty and they could of course never be
employed in ways that would conflict with their primary
loyalties toward their own countries. This still leaves open,
however, a wide range of potential uses. The desirability of
more effective use of foreign nationals increases as we shift
our attention to Latin America, Asia, and Africa where the
338
The CIA and the Cull of Intelligence
conduct of United States nationals is easily subject to scru-
tiny and is likely to be increasingly circumscribed.
Tliese suggestions about unofficial cover and career agents
illustrate and emphasize the need for continuing efforts to
develop covert action capabilities even where there is no
immediate need to employ them. The central task is that of
identifying potential indigenous allies — both individuals and
organizations — making contact with them, and establishing
the fact of a community of interest.
There is some rcwm for improvement, Mr. Bissell thought,
in the planning of covert action country by country. Covert
intervention is probably most effective jn situatio ns where 5 *
Domriretiensive ctttjrt is undertaken wiih_a numlbei^of sega-
TSWDpei Jfll/llT'^esigne'd lo"supporr and complement one
anotTlFr'mnTt>''trivtria*( uTtfdlaiiCfly' significant effecirTSe
Agency probably finds itself invotved Irt too "trtany small
covert action operations having no particular relationship
with one another and having little cumulative impact.
There is no doubt that some covertly funded programs
could be undertaken overtly, Mr. Bissell thought. Often
activities have been initiated through CIA channels because
they could be started more quickly and informally but do not
inherently need to be secret. An example might be certain
exchange of persons programs designed to identify potential
political leaders and give them some exposure to the United
States. It should be noted, however, that many such inno-
cent programs are more effective if carried out by private
auspices than if supported officially by the United States
governinent. They do not need to be covert but if legitimate
private entities such as the foundations do not initiate them,
there may be no way to get them done except by covert
support to "front" organizations.
Many propaganda operations are of declining effectiveness.
Some can be continued at slight cost, but some of the larger
ones (radio, etc.) are pretty well "blown" and not inexpensive.
USIA doesn't like them, although they did have a real
justification some ten to fifteen years ago as the voice of
refugees and emigres, groups which also have declined in
value, and in the view of some professionals are likely to
continue declining in value.
In his last two years in the Agency, Mr. Bissell felt that
the Clandestine Services could have been smaller.
Indeed, steps were taken to reduce their size. It is impossi-
Appendix
339
ble to separate the issue of size from personnel and cover
problems. It was Mr. Bissell's impression that the Clandes-
tine Services were becoming increasingly a career service,
too much like the Foreign Service (personnel looking to a
succession of overt posts in a safe career). One result was
the circumscription of local contacts. There was a subtle
change taking place, which threatened to degrade some of
CIA's former capabilities. Formerly, the CIA had a staff
with a wide variety of backgrounds, experiences, and
capabilities. Its members were recruited from every sort of
public and pnvate occupation. If this diversity and vanety is
lost through the process of recruiting staff members from
college, training them in a fairly standard pattern, and carry-
ing them through orderly planned careers in the Agency,
one of the organization's most valuable attributes will
disappear.
Finally, Mr. Bissell remarked on large operations. It is
self-evident that if an operation is too large, it can't remain a
deeply kept secret. At best, one can then hope for a success-
ful formal disclaimer. The worst of many faults of the Bay of
Pigs operation was excessive reliance on the operation's
disclaimability.
It has been a wise decision that operations of that scale
not be undertaken by the Agency, except in theaters such as
Vietnam, where the stakes and standards are different.
Covert action operations are generally aimed at short-
term goals and the justification for the control machinery is
that bias of operators to the short run can be compensated
for in the review process. Mr. Bissell can conceive of no
other way to force greater attention to long-range costs and
values. One alternative is that caution will lead to ineffec-
tuality. "Operational types" will be risk-takers; the counter-
weight is, and should be, applied by the other agencies in
government.
In the discussion following Mr. Bissell's talk, the issue of
CIA cover was cited as among the more interesting from the
perspective of a former State Department appointee. The
size of covert operations known to other governments was a
continuing embarrassment, and the overseas staff maintained
for these purposes and known to host governments was a
similar source of embarrassment. From time to time, efforts
were made to reduce overseas staff; although agreement in
340
The CIA and the Cull of Intelligence
principle was readily forthcoming, the particulars of staff
reduction were difficult to obtain.
A former member of the Special Group (who served eigh-
teen months on that committee) agreed with Mr. Bissell's
earlier remarks on control mechanisms, insofar as they
applied to review of new projects. These received most
careful scrutiny. Insofar as the Special Group considered
ongoing projects during this eighteen-month period, it was
recalled that there was not any systematic, thorough proce-
dure for such review, the committee finding itself busy with
all the new proposals. If it were true that most operations
were most useful for short-term goals, then perhaps there
should be greater attention to review of ongoing projects,
and termination of more projects earlier than in past practice.
A continuing problem which worries one former official
was that concerning the "charter" of CIA, the public expres-
sion of which, in the National Security Act of 1947, was
necessarily vague. CIA's full "charter" has been frequently
revised, but it has been, and must remain [,] secret. The
absence of a public charter leads people to search for the
charter and to question the Agency's authority to undertake
various activities. The problem of a secret "charter" remains
as a curse, but the need for secrecy would appear to pre-
clude a solution.
Another former official remarked on the inadequacy of
clandestine intelligence as a means of obtaining enemy
intentions. Sherman Kent (former Chairman, Board of Na-
tional Estimates) distinguishes "the knowable" from "the
unknowable," and we should recognize that much remains
impossible to know, including, frequently, enemy intentions.
Respecting the reduction of overseas personnel and pro-
grams of declining utility, it was noted that the curtailment of
over-age and unproductive personnel was a thorny issue.
Recognizing the likelihood of appeal to the President and
the absence of widespread participation in a manpower review,
a former budget official arranged the participation of the
Bureau of the Budget. CIA, FIAB, and relevant Under
Secretaries in considerations of budgetary modifications. What
emerged was an inertia, partly the inertia of the cold war.
Parenthetically, a couple of much-criticized public media
projects (cited by name) had proven of value, as the fall of
Novotny in Czechoslovakia suggested, but a number of inef-
fective programs were retained. The problem was to free the
Appendix
341
budget, to do something new, in the place of old programs,
not to reduce the budget, but unfortunately, the chiefs in
CIA wanted to control their working capital. If it were only
possible to tell these officials not to worry, that we were
setting aside Sxxx million for CIA, and merely seeking to
encourage better use of the same dollar amounts, then it
would have been possible to move around some money. The
big "iffy" question was a particular (named) foundation,
which received a sizable allocation. Finally, everything was
cleared up, and the next big review was scheduled, but never
really effected as a consequence of the Cuban missile crisis.
The review was geared up in 1963 once again.
Another observer, drawing upon work with the "combined
cryptologic budget" and private industry, concluded that it
was usually impossible to cut a budget; usually it was only
possible to substitute a new project for an old one.
The Chairman suggested a number of questions: What are
the effects of covert operations being blown? What can be
done to improve the image of the Agency? What can be
done to improve relations between the Agency and the
press?
It was thought that a journalist's perspective might aid in
discussing these questions, but a number of prior issues were
thought to require attention:
(1) The matter of size required attention. In any govern-
ment agency size can become a problem; increasingly there
is a realization that the government is too big and "an
ever-swelling tumor." At some point there will have to be a
fairly sharp cutback in the U.S. foreign policy establishment.
(2) One was not overly impressed by the use of CIA in the
developing world; in any case, we could have increased
confidence in the range of choice in most developing areas.
Conversely, it might not be as easy as Mr. Bissell suggested
to know the power structure in more developed areas, in
Western Europe and Japan.
(A query was interjected: Why should we have increasing
confidence in the range of choice in developing areas?
Perhaps there are less variations than we earlier thought.
"Things are evening out and we can live more comfort-
ably.")
(3) Where do you bury the body? One is not completely
convinced by citation of the experience with Frank Wisner's
OPC. We could get around the responsibility issue raised by
342
The CIA and the Cull of Intelligence
"Beedle" Smith; we could get around conflicting chains of
command.
(4) Related to (3). Maybe there is a cost to be paid for
having covert operations under CIA. Perhaps we could have
intelligence collection under State and covert operations un-
der the Special Assistant to the President for National Secu-
rity Affairs.
In response to items (3) and (4) some earlier remarks were
clarified: one would not claim that the operational side of
CIA need be where it is. Rather, one would inveigh against
the splitting of covert intelligence collection and covert
operations. One could, however, split the operational side
from the analytic side. This is a plausible case, a solution for
which could be worked out (though, on balance, the speaker
was against it). But to split the operational side — as the
German case, the British case for a time, and our own for a
time suggested — would be disastrous.
Remarking on labor activities, one participant stated that
before May 1967 it was common knowledge that there had
been some CIA support for labor programs, but first Ramparu
and then Tom Braden spelled out this support in public.
Those in international labor affairs were dismayed, and cer-
tain newspapermen compounded their difficulties by confus-
ing AID with CIA, and claiming that the AFL-CIO's Free
Labor Development program was tainted.
Since these disclosures, the turn of events has been
unexpected. First, there hasn't been any real trouble with
international labor programs. Indeed, there has been an
increase in demand for U.S. labor programs and the strain
on our capacity has been embarrassing. Formerly, these
foreign labor unions knew we were short of funds, but now
they all assume we have secret CIA money, and they ask for
more help.
Worse yet, Vic Reuther, who had been alleging that oth-
ers were receiving CIA money, and whose brother's receipt
of $50,000 from CIA in old bills was subsequently disclosed
by Tom Braden, still goes on with his charges that the
AFL-CIO has taken CIA money. Here again, no one seems
to listen. "The net result has been as close to zero as possible.
We've come to accept CIA, like sin." So, for example,
British Guiana's labor unions were supported through CIA
conduits, but now they ask for more assistance than before.
Appendix
343
So, our expectations to the contrary, there has been almost
no damage.
A former State Department ofFicial offered some remarks
on intelligence operations as seen from the field. He con-
curred in Mr. Bissell's remarks on "cover." The initial agree-
ment between the Agency and State was intended to be
"temporary," but "nothing endures like the ephemeral."
How are Agency officials under "official cover" specially
equipped to handle covert operations? If the Agency station
chief has a "special relationship" with the chief of state, one
would submit that it was because the Ambassador wasn't
worth a damn. Moreover, such a "special relationship" cre-
ated the risk that the chief of state, seeing two channels to
Washington, could play one off against another. Some for-
eign statesmen are convinced that an "invisible government"
really exists, and this impression shouldn't be allowed.
Also, prejudice in favor of covertly obtained intelligence
is a troublesome thing.
One way to overcome the misconceptions is to make CIA
a truly secret service, and not merely an agency duplicating
the Foreign Service. With money shortages CIA has often
filled a vacuum, but this does not make it right.
Another questioned the discussion leader's proposal for
greater utilization of non-U. S. nationals. How could you get
non-nationals to do the job and to develop loyalty to the
United States?
One was not sure that it was doable, but it was worth
trying. It would be more prone to work if you used a
national of Country B to work in Country C, if what you are
asking is neither (I) against the interest of Country B, nor
(2) nefarious. You do need some cover, and the natural
vehicle is an organization with non-American nationals.
Another observer was struck by the lack of interest in the
"blowing" of covertly sponsored radio activities. Why has
there been so little interest in these activities, in contrast to
the immense concern over the CIA-NSA relationship? One
might conclude that the public is not likely to be concerned
by the penetration of overseas institutions, at least not nearly
so much as by penetration of U.S. institutions. "The public
doesn't think it's right; they don't know where it ends; they
take a look at their neighbors." Does this suggested expan-
sion in use of private institutions include those in the United
States, or U.S. institutions operating overseas?
344
The CIA and the Cull of Imelligence
In response, attention was drawn to the clear jurisdic-
tional boundaries between CIA and the FBI, CIA being
proscribed from "internal security functions." CIA was averse
to surveillance of U.S. citizens overseas (even when specifi-
cally requested), and averse to operating in the United States,
excepting against foreigners here as transients. One might
want CIA to expand its use of U.S. private corporations, but
for objectives outside the United States. It was recalled that
the Agency funding of the National Student Association
was, in every case, for activities outside the United States or
for activities with overseas objectives.
Why, we might ask, should the U.S. government use
nongovernmental institutions more, and why should it deal
with them in the United States? If dealings are overseas,
then it is necessary to maintain an overseas bureaucracy to
deal with the locals. It is also necessary to engage in commu-
nications in a possibly hostile environment. If one deals
through U.S. corporations with overseas activities, one can
keep most of the bureaucratic staff at home and can deal
through the corporate headquarters, perhaps using corpo-
rate channels for overseas communications (including classi-
fied communications). In this opinion, the policy distinction
should involve the use to which the private institution is put,
not whether or not to use private institutions.
In another view it was desirable for this discussion group
to examine different types of institutions. For example, should
CIA use educational institutions? Should CIA have influ-
enced the selection of NSA officers?
One was not aware that CIA had influenced the election
of NSA officers; if it had, it shouldn't have done so, in one's
opinion.
Mightn't it be possible to deal with individuals rather than
organizations?
Yes, in many cases this would be preferable. It depended
upon skill in the use of our operating capabilities.
As an example of the political use of secretly acquired
intelligence, a former official noted the clandestine acquisi-
tion of Khrushchev's "secret speech" in February 1956. The
speech was too long for even Khrushchev to memorize, and
over one hundred people had heard it. We targeted it, and
by secret means acquired a copy. The State Department
released the text and The New York Times printed it in full.
The repercussions were felt around the world, and particu-
Appendix
345
larly within the Communist bloc. The Soviets felt unable to
deny the authenticity of the text we released, and the effect
upon many of the satellite states was profound. It was the
beginning of the split in the communist movement. If you
get a precise target, and go after it. you can change history.
Another observer was troubled by the earlier-expressed
point about increased use of private institutions. Most de-
moralizing in the academic community was the sense of
uncertainty about institutions with which individuals were
associated. There is a profound problem in penetrating insti-
tutions within the country when there is a generalized loss of
faith, a fear that nothing is what it seems.
It was noted that the next session, on February 15, 1968,
would concentrate upon relations with private institutions.
To one observer, part of this solution would be found in
the political process, involving extragovernmental contacts
in the sphere of political action.
In response to a query, the relative ultilities of types of
intelligence data were reviewed. Most valuable was recon-
naissance, then communications — electronic intelligence, then
classical espionage.
We have forgotten, it was noted, the number one overall
source, namely, overt data.
The meeting was adjourned at 9:15 p.m.. and participants
were reminded of the next meeting on February 15.
WILLIA.M R. HARRIS
RAPPORTEUR
INDEX
A ll spy plane (later SR-71).
32. 67
Abel, Col. Rudolf, 159
ABM (anti-ballislic missiles).
177, 269-72
Aclus Technology. 126
Adoula, Cyril, 28
Aero Associates, 127
AFL-CIO, 45, 342
Africa, West. 164
African Research Group. 3U
Agency for International
Development (AID). 41. 50.
53, 109. 124. 206n.. 209n..
335; in Chilean election, 1964,
14n.; pcople-to-pcople
exchange programs, 45-47
Agnew. Spiro. 250n.
Agree. George. 327
Air America. 50-52. 105.
106-107, 121. 123-26. 132.
133.200.205. 215
Air Asia. 51, 52, 121. 123. 125,
126, 132. 133. 200
aircraft, spy planes, 175-76.
257-58, see also SH-71;
SR-71; U-2
Air Force, 67, 76, 253; Air
Asia and, 125-26;
contribution to CIA, 53; in
Cuban missile crisis, 262,
263-64; intelligence
services, 76-79, 258; missiles,
269; MOL (manned
orbiting laboratory), 86;
Peshawar base, 256;
Security Agency. 167; SOFs,
96; spy planes, 175-76
257-58. 284
airlines owned by CIA,
121-36, 200
Albania. 284; guerrilla
movement attempted. 21, 99
Allendc. Salvador: election,
1970, 12-17. 56n.. 252. 280,
300-301; overthrown and
killled, 17-18
Alsop, Joseph. 143, 271, 303
Alsop, Stewart, 279-80
Altschul, Frank, 327
ambassadors, CIA relationship
with, 39, 40, 29ft-92
American Committee for
Liberation, 119
Amory, Robert, Jr.. 32, 236.
260. 288. 302. 327
Anaconda Copper, 13, 56n.
Anderson. Adm. George,
285. 291. 292n.
Anderson. Jack, 16. 301
Angola. 127
Ankara. 158
Arab-Israeli conflict. 71/i., 174
Arguedas, Antonio, 1 16-17,
283
Arlington, Va., 234, 240
Army: in domestic surveillance,
193; G2-type units. 79;
intelligence services. 76-78, 79;
Security Agency, 167;
Special Forces, 97, 105-06.
109. 113
Army Magazine, 267
Asia Foundation, 21. 150-51
350
Index
Assistant Secretary of Defense
for Intelligence. 80
Atlantic Monthly, 260n.
Atomic Energy Commission.
81. 297
Aitwood. William. 3*4
Bailey. Pearl. 39
Baker. William. 2SSn.
balloons, propaganda. 137-39
Bangkok. 77
Barker. Bernard. 213
Barnds. William. 302. 302/i..
327
Barreintos, Ren*. 112. 114-17
Banlelt. Charles. 300-301
Bay of Pigs invasion, see Cuba
Beecher. William. 271. 271n.
Beirut, 214
Bell laboratones. 270
Bender. Frank. 109
Bennett. Lieut. Gen.
Donald. 78
Berger. Marilyn. 280
Berlin. 262; crisis of 1961. 185;
tunnel operation. 10. 332
Bernstein. Meyer. 44. 327
Berrellez. Robert. 300
Berry, Col. Sidney B., Jr., 327
Bissell, Richard, 39, 41. 43.
46, 67, 212-13, 237, 275; on
ambassadors, 291 ; Chief of
Clandestine Services, 3(K34:
Council on Foreign
Relations speech. 22-23, 24.
30, 32-35. 38. 43. 45. 275,
282; text, 327-15; on
Guatemala operations, 253;
replaced by Flelms, 27. 31; on
U-2 incident. 306
Bitlman. Ladislav. 77if
Deception Game, 152
Bolivia. Che Guevara in. 112-17
Boston Symphony Orchestra, 42
Bowles, Chester, 182, 291
Braden, Tom, 23 , 4 1-42 , 44, 3 1 8.
342
Brandt. Willy. 149
Brazil. 227; airplane
hijacking in. 21 1-12;
cryplological equipment
for. 73
Britain. 249; intelligence and
secret service. 8. 19. 154, 187,
289-90; Penkovsky as
agent. 154-56. 224; secrecy in,
302; Soviet official.^
expelled. 313; Special
Operations Executive, 100
Broe, William, 16-17, 56n.
Brown, Irving, 42
Brown, Sam. 41
Brussels. 214
Budget. Bureau of the. 208.
287-89. 340; see also Office
of Management and Budget
bugging (audio surveillance),
161-64
Bulgaria, broadcasts to. 146
Bunker. Ellsworth. 40. 291
Burdick. Eugene. 25
Burgess-McLean affair. 154, 332
Burke. Adm. Arleigh, 28
Busby, Fred, 275
Cabell, Maj. Gen. Charles, 27,
31
Cabot, Thomas D., 119
Cambodia: U.S. bombing,
27ln ; U.S. invasion, 231, 284
Camelot. Project, 14
Camp Hale. Colo., 102
Camp Peary, see Farm. The
Canada. CIA in. 227
Canal Zone. CIA training
base. 93, 109. 242
Canton. 137
Caramar (Caribbean Marine
Aero Corporation). 120
Carlson. Alex E.. I22n.
Carter, Lieut. Gen.
Marshall, 27. 308
Case. Clifford. 149. 190
Castro. Fidel. 31, 37, 46;
Index
351
Casiro, Fidel (com.)
assassination planned,
260n. : and Che Guevara,
III, 113: and Soviet
missiles, 260-61, 265; U.S.
plots to overthrow, 27,
108-109, 200, 251 , 254, 258-60
Calledge, Turner, 307; My
Life and The Times. 307
CBS (Columbia Broadcasting
System), 305
Central Intelligence Act
(1949), 7, 54, 131,209,227,275
Cerf, Bennett, 30K
Chennault, Gen. Claire, Flying
Tigers, 121
Cherne, Leo, 286n.
Chesapeake and Potomac
Telephone Company, 172
Chiang Ching-kuo, 40
Chiang Kai-shek, 40, 121. 256
Chicago, police trained by
CIA. 188
Chile: Allende overthrown
and killed, 17-18; election,
1964, 14, \4n.. 37; election,
1970,5, 12-17, 37, 47-48, 56n.,
252, 280, 3(X)-301, 319;
embassy in Washington
burglarized, 18; Project
Camelot in, 14
China, Chiang Kai-shek's
government, 121
China. Nationalist, 39-40,
102; CAT air transport for,
121-23; and U.S.
intelligence service, see also
Taiwan
China, People's Republic of, 69,
143, 256-58; balloon
propaganda in, 137-39: CIA
paramilitary operations in,
21. 100-103. 205; CIA
surveillance in. 6; 8, 9, 31,
1 22, 257-58, 264n. . 284; cultural
revolution, 40, 137-38;
espionage against. 168-69,
174-75, 176. 331: -Great
Leap Forward." 103: missile
program, espionage on,
165, 167, radio broadcasts to.
139-41; Red Guards.
137-39, 141; Tibetan revolt
against, 101-104, 127 , 308;
U-2 plane shot down. 264n,
China Air Lines, 123
CIA (Central Intelligence
Agency):
Airlines owned by, 121-46,
199
blacks and other minority
groups in, 238
budget presented to
Congress, 295-97
Cable Secretariat, 5S-59
case officers,
relationship with agents,
222-27, 228-30
chief of base, 62
chief of station, 39, 62
clandestine mentality, 5-6,
210-15, 230-34
Clandestine Services, 8,
13n. . 20, 40. 96-97, 108-109,
112. 208, 222, 227, 244, 280,
286, 291-92; and airlines.
130-36; in Cuban
intervention, 259-61, 264-^5;
domestic surveillance, 191-93,
197, 198-99; employees,
232-34; espionage, 59-63, 158,
159, 160n., 161-62. 164-65.
170-71. 178-84; and 40
Commillee, 278-84;
operations. 23-33, 35-38,
46-47, 113-14; organization,
49, 50. 52-53, 57, 58-65, 68; press
relations, 303-304, 311-13;
propaganda, 137, 140. 141-42,
144-45. 147. 153-54;
recommendations on, 322-24,
338-39
Communications, Office
of. 64
352
Index
CIA (Con l.)
control of; by
ambassadors, 290-92; by
Congress, 276-77. 292-309,
321-22; by 40 Committee.
27B-85: by PFIAB and 0MB.
2R5-90
cost and financing oT, 49-57
Counic rintelligcncv
Starr. 62. l79-80n.
covert action, see covert
action
Covert Action Starr. 24.
62-63. 137. 141, 142, 153. 192
Cunningham's study or.
84-85
Deputy Director
(DDCI), 57
Director (DCI). 57-58.
173. 174. 277. 279; and coven
action. 37; in intelligence
community. 70-7 In., 81,
90-92. 282-93; orfice or,
57-58
Directorate of
Operations, see Clandestine
Services above
Director's Contingency
Fund, 54, 55
and dissident or protesting
groups, 192-93
Domestic Contact Service.
191-92, 198-99
Domestic Operations
Division. 62, 191-93. 234
domestic surveillance,
187-202
economic operations, 46
espionage, see
espionage; intelligence
community
establishment or, 7, 19-20,
275-76
Executive Committee for
Air, 134-35
Far East Division, 205
FI/CI projects, 179
Finance Office of, 63-64
Foreign Intelligence
Slafr, 62, 171, 179
in roreign pohcy, 24il-5S
General Services
Administration, 49n.
headquarters and other
buildings, 234-36
Historical Intelligence
Collection, 245
Historical Starr. 58, 59
Intelligence Directorate,
63. 65-«.. 140, 187. 194. 199.
259-60. 304 . 312
Intelligence Resources
Advisory Committee. 58
investments. 55-56. 56n.
Katzenbach committee
investigation or. 43-45, 149,
151
Kennedy's action on, 27-28,
3(V-31. 318
and labor organizations,
42-43, 44-^5, 342-43
Logistics, Office of. 64
Management and
Services Directorate, 63-65.
68. 179, 235
Medical Services, Orrice
of. 64
Missions and Programs
Starr, 63
National Estimates, Board
or, 14-15. 58, 58n., 134-35,268
National Estimates,
ornce or, 72-73, 79. 238
National Intelligence
Orricers. 57-58, 58/i.. 268
Operational Services
Division, 63
organization or, 51-59
Personnel, Orrice or, 64-65
personnel policies and
benerits, 242-45
Planning, Programming,
and Budgeting Starr, 130, 148,
150, 288
Index
353
CIA (Con't.)
police training by, 187-89,
196
President's authority over,
37-38, 47, 251-54, 276-77, 285
press and, 299-316
private organizations,
connections with, 41-44
propaganda, set
propaganda and disin-
formation
proprietary organizations,
118-36
publications, 245—47
recruitment of personnel,
196, 2(X), 215-20. 236-39
Science and Technology
Directorate. 53, 63, 66-68.
83, 164. 165. 1%
secrecy in, 4-6, 213-14,
228-34, 251-52
secretarial staff, 239. 240
secret history of, 246-47
Security, Office of, 164,
179, 194
security precautions,
232-35, 239
Senior Executive Group,
85
size of, 20-21. 49-53
social class and snobbery
in, 239-43
Southeast Asia programs,
205-209; see also Laos;
Vietnam
Soviet Bloc Division,
154. 181-82. 192
special operations
(paramilitary), 96-117
Special Operations
Division, 24, 63, 96-97, 100,
105-106, 110. 136, 192
tactics, 19. 38. 39-42
Technical Services
Division, 63. 161-62, 164
termination of service
in. 226-28
Training Office of, 64, 85
training of personnel, 97-98,
222-23, 2J9-42
universities, connections
with, 50-51, 194-97. 238
in Watergate scandal. 9-10,
189-90, 298, 315
Western Hemisphere
Division, 192
women in, 239
Ciano, Count Galcazzo. 246
Civil Aeronautics Board. 130
Ci\nl Air Transport (CAT).
26 102. 121-24. 133. 134n..
200
Clark. Ramsey. 128
Clav. Gen. Lucius, 148
Clifford. Clark. 285
Cline, Ray S.. 40. 81
code breaking, 167-72 ^
Colby, William, 17, 58, 92,
189,192,268, 295/i. .319-20; as
Director, appointment,
209-10; on Laos operations,
276-77; press relations, 304;
in Southeast Asia programs,
205-209
Cold War, 6, 7, 10 . 23 . 99, 318;
espionage in, 167-68, 178,
185-86; propaganda in, 137,
146, 150
Colorado, 97
Columbia Forum, 308n.
Combat, Le, 144
COMINT (communications
intelligence), 22, 82, 167, 171
Committee to Re-Elect the
President (CREEP), 298
communism: containment of,
3, 8-9, 21, 22-23, 212;
defectors from, 151-52,
158-61, 182, 183, 216, 314;
radio propaganda against,
146-48
Congo, 127, 291 ; Che Guevara
in. 111; CIA intervention
in, 28, 104, 120, 132
354
Index
Congo, Democralic Republic
of the (Zaire). 1 1 1
Congress, 7, 90; CIA
controlled by, 276-77: 292-99,
321-22; and intelligence on
Soviet Union, 272-73; in
Watergate affair, 293. 298
Connally. John. 2S5n.-86n.
Continental Airlines. 124-25
Cooper, John Shcrinan, 295/1.
Cooper, Wayne, 206
Corfu. 284
Council on Foreign
Relations, 237; Bissell's
speech, see Bisscll,
Richard
counterespionage, U.S. and
Soviet Union, 177-86. 323-24
covert action. I9-4K, 68, 324;
CIA Directors, decisions, 37;
in Cold War, 21-23;
President's authority in.
37-38; special operations
(paramilitary), 95-117; in
Third World, 24-26; in
World War II and later,
19-20; see also Bissell,
Richard, Council on Foreign
Relations speech
cryptology, 167-72
Cuba: Bay of Pigs invasion,
5,9,27,28,31,37.83. 98, 101.
103, 107-108. 1 19-20.
122n.. 128, 132, 258-61, 265,
280, 282, 284, 306-307.
308n.. 309. 318. 339; CIA
plans, 251, 254. 258-63;
CIA's small operations
against, 46, 108-109, 119-20;
hijacked airplane flight to.
211-12; missile crisis. 155,
245^6, 261-65, 286, 307. 315;
sugar trade disrupted, 46,
U-2 flights over, 262, 263-64.
264n
Cuban exiles, 28, ICR, 200, 261,
306
Cummings. Samuel. 120
Cunningham, Hugh, study of
CIA. 84-85
Cyprus. 140, 292n.
Czechoslovakia. 159. 340;
intelligence service. 152;
Soviet action agamst, 177, 286
Daily Worker. The. 144
Dalai L.ima, 101-104
Daniel, Clifton, 305, 307, 311
Dcbray, Regis. 112. 114. 116
Defense Department. 50. 56. 65.
67. 109. 126, 140. 211. 292.
328-29; contnbution to CIA,
53; dissident groups,
surveillance of, 80; in
espionage, 167. 174; in
intelligence community, 69,
71,74-75, 80, 87-90; and
intelligence estimates, 267-69;
intelligence services,
Fitzhugh recommendations
on, 76. 80, 89-90; Laos
operations, 206n. ; missile
mformation, 272
Defense Intelligence Agency
(DIA), 78-79, 80, 87, 262-63.
269, 287
Defense Investigative
Service, 8(1
Defense Mapping Agency, 80
Delaware Corporations, 118
Denver, Colo., 194
Deriabin, Peter, 156
Dibble, Arnold, 123n.
Dien Bien Phu, 122
Dillon. C. Douglas. 30, 327
disinformation, see propaganda
and disinformation
Donovan, Gen. William, 7
Doole, George, Jr.. 51,
133-36
Double-Chek Corporation,
120, 122ji'
Doubleday and Company,
156
Index
355
Downey. John. 100. 123
drugs. CIA interest in, 197n..
214-15
Dryfoos. Orvil, 307
Dulles. Allen. 7. 22-23. 27.
28.30.31,32.78.83.214.236.
240. 283. 292, 296, 306. 311.
327; and Bay of Pigs
invasion. 258-60. 265. 307;
Chief of Clandestine
Services. 20; The Craft of
Intelligence, 154. 278. on
intelligence work. 20; on
KGB. 317; press relations,
303; replaced as CIA
Director, 27. 31
Dulles, John Foster, 26. 101
Eaton, Frederick, 86-87
EC-121 spy plane, 175, 257, 284
Egypt, 170, 259
Eisenhower, Dwight D., 26-27,
241, 253, 285; and Cuban
operations, 251, 260; denies
CIA intervention in
Indonesia, 101; summit
meeting with Khrushchev,
257
Eisenhower administration,
5, 256, 261, 290, 306
Electric Boat Division of
General Dynamics, 108
ELINT (electronic
intelligence), 82
Ellender, Allen, 277n.. 294
Ellsberg, Daniel. 64; burglary of
his psychiatrist's office, 189,
211
Encounter, 42
espionage, 68, 158-200: air
reconnaissance, 167-68,
257-59; audio surveillance
(bugging and wiretapping),
161-64; CIA In, 76-77,
81-83. 158-73, 176, '
177-87. 191-200, 322-23,
329-34; code breaking and
cryptology, 167-72;
counterespionage, U.S
and Soviet. 177-86. 323-24;
defectors in. 158-61, 182,
183, 216, 314; domestic
surveillance. 187-201;
mterception of messages.
167-68. 171-73; satellites and
spyplanes. 167, 174-76, 184-85;
technological methods,
82-83, 161-64, 166-68, 174-77
Estonian refugees, 201 , 276
Export-Import Bank, 249
Farm, The (Camp Peary, Va.),
24 . 98, 188 . 222, 241
FBI (Federal Bureau of
Investigation). 23, 81. 189.
344. CIA s friction with. 191.
194-95; in counterespionage.
17H-79. 323-24; in domestic
surveillance. 191, 193-94;
wiretapping by, 172-73
Fecteau. Richard. 100. 123
Federal Aviation Administration.
129
Finney, John, 310
Fitzhugh, Albert, panel,
recommendations on
intelligence services, 76, 80,
89
Foochow, 137
Foreign Affairs, 302
Foreign Broadcasting
Information Service (FBIS),
65, 140
Fort Bragg, N.C., 242
Fort Gulick, Canal Zone,
109-10, 242
Fort Leavenworth, Kan., 217
Fort Meade, Md., 80, 168, 169
40 Committee, 12, 13. 15, 81,
9I,138,I42,2S3,2S8,288;CIA
conirolled by. 278-87;
members. 279n.; name
changed. 278n.
Foster, John, 286n.
356
Index
Fox. Col Ed, 116
France; CIA in, 23, 144; Soviet
espionage in, 183
Frankel. Max. 30Kn
Frankfurt, defector reception
center, 151, 159
Franklin. George S., Jr., 327
Frei, Eduardo. 14
Fubini. Eugene, 327
Fukicn province, 137
Fulbright, J William. 293. 295
Galvin. Robert, 286n.
Garcia. Jolio Gabriel. 116
Gardner. John, 43
Gayler, Adm., 171
Geneva Accords: 1954, 26;
1962, 29
Germany, Nazi. 141;
underground movements in
World War II. lOS. 2U5
Germany. West. 77;
broadcasts From. 146, 149;
CIA in. 23, 62. 81. 137, 227,
330; communist defectors
in, 159-60; Soviet espionage
in, 183
Gibraltar Steamship Company,
119
Godley, G McMurlie, 291
Goldberg, Arthur, 127-28
Gomulka. Wladyslaw, 147
Gonzales, Eddie and Mario,
116
Graham, Maj. Gen. Daniel.
78, 78n., 267
Gray, Gordon, 286n.
Great Britain, see Britain
Green Beret murder case, 73-76
Green Berets, 109
Greene, Graham, The Quiei
Americans 25
Guantanamo Bay, Cuba, 262
Guatemala. CIA intervention,
5,21,23,97, 107,254,306-307
Guevara, Che, 111-17;
execution, 115
Guinea, Portuguese. 127
Guyana (British Guiana), labor
unions, 45, 342
Halberstam. David, 31
Haldeman, H R., 193n.
Hanoi, propaganda in, 143
Harper & Row, Inc., 312-13
Harris, William R., .10. 327
Harrison, Gilbert, 307
Harvard University, Center
for International Affairs, 30
Havana, 258-59, 261
Hawkc, John Richard, 12R-29
Hubert, F Edward, 292
Heine, Eerik, 201
Helms, Richard, 13, 16, 41,
44,50n.,51,56,65,68,73n.,76,
128, 129, 21)9, 231, 235, 246,
274. 288. 29(1, 294-95, 295n. . 296;
and Che Guevara. 113; Chief
of Oandestine Services, 27,
3 1 ; discharged, 92; and
domestic surveillance, 188,
189, 190, 190n., 191, 197, 198,
201; and espionage, 176;
and foreign policy, 251; and
intelligence community.
84-88, 91-92; and National
Security Council, 250;
press relations, 309-13.
314-15; and propaganda,
145-^, 155; in Watergate
hearings, 190
Hcndrix, Hal, 300, 315. 315n
Hilton. John S.. 116
Holmes. Julius L., 327
Honduras, 97, 1 19
Hong Kong. 139. 140. 208. 214
Hoover. J. Edgar, 27, 194
House Appropriations
Committee, 89
House Armed Services
Committee. R8n., 292, 293
House Foreign Affairs
Committee. 17
Houston, Lawrence, 128, 312-13
Index
357
Hughes, Harold, 209-10. 277,
319-20
Hughes, Thomas, 32, 327
Hull, Gen. John, 285
Humphrey, Hubert, 129
Hungary: broadcasts to, 146;
revolt: 1957, 146, 147; in U.N. .
127
Hunt, E. Howard, 143n., 189,
210-11, 260n., 296n.
Huston, Tom Charles, 171n.,
190n.
India, 97, 291
Indonesia: CIA intervention,
5. 26, 36-37. 101, 122, 145,
254
Intelligence and Research.
Bureau of (INR). 80-81. 87
intelligence community.
68-92, 321-23; CIA in, 69-71.
72-76, 78, 81-88, 91-92;
classified information, 71,
71n.,73-76, 81,81-88, 91-92;
components of, 68-70;
Fitzhugh recommendations
on. 76. 80. 89; military services
in. 76-80. 83-84;
reorganization of. 88-92, size
and cost of, 69-70;
technological data collection,
82-83, 161-64; 167-68; 174-77
Intelligence Resources
Advisory Committee
(IRAC), 71, 87
Intermountain Aviation, 97,
121, 126-27, 200
International Armament
Corporation (Interarmco),
120. 136
International Business
Machines (IBM). 217
International Telephone and
Telegraph Company
(ITT), 162. 262, 315n.; in
Chilean election, 1970. 13,
16-17, 56n. , 300-301
Iran, 226; CIA intervention
in, 21. 23 , 26. 39
Israel: Arab-Israeli conflict.
71n.. 174; Liberty attacked,
175, 257, 284
Italy. CIA in, 17, 39, 144
Jackson, Henry, 272
Jaffe, Sam, 305
Janos. Leo, 260n.
Japan: investments in
Vietnam. 46; OSS operations
against. 100; Pearl Harbor
attack, codes, I65n.
Javits, Jacob, 275
Jews in Clandestine Services, 187
Johnson, Kelly. 32
Johnson. Lyndon B.: on
assassination plot against
Castro, 260n.; committee
on CIA's relationship with
private institutions, 44, 149;
and intelligence services, 66,
66n., 83, 90; and OMB. 288;
and PFIAB. 286; at Punta del
Este. 55; and Vietnam war,
206. 207, 253
Johnson administration, 5, 86,
109, 193, 206, 209n., 270
Johnston, Oswald, 304
Joint Chiefs of Staff, 78, 88, 175,
184, 257
Joint Reconnaissance
Committee, 175
Joint Reconnaissance Schedule,
284
Justice Department, 128
Kahn, David, 169n.. 17In.
Kalb, Marvin, 310
Karamessines, Thomas, 113
Karnow, Stanley, 25, 305n.
Katmandu. Nepal, 129
Katzenbach, Nicholas,
committee on CIA and
private institutions, 43-44,
149. 151
358
Index
Kennedy. John F., 253; and
ambassadors' responsibililies,
290: on assassination of
Castro, 260n. ; and Bay of
Pigs invasion, 5, 27, 31,
108; and CIA, 27-28, 30-31,
318; and Cuban missile
crisis, 261. 263-65; and Laos
intervention, 28-29; and
PFIAB, 286; press relations,
307, 308
Kennedy. Robert, 28
Kennedy administration,
30-31, 109, 143n., 280
Kent, Sherman, 34G
Khrushchev, Nikita, 185. 186.
257; in Cuban missile crisis,
264-65; de-Stalinization
speech, 22, 344-^5; tapes
dictated by, 164
Khrushchev Remembers, 156-57
Killian, James, 285
King, Martin Luther, 66n.
Kinshasa, 214
Kishi, Nobusuke, 145
Kissinger, Henry, 66, 7 In., 172,
211, 249. 257. 268; and
Chilean election, 1970, 12, 15,
17, 18, 47^8, 280, 319; and
intelligence services, 91, 278,
281n.. 285; National
Security Council, 58
Koch, Edward, 188
Kohler,Foy. 186
Komer, Robert, 207
Korea, North: CIA
paramilitary actions in,
100; espionage against, 166;
Pueblo captured, 169, 175,
257, 284; spy planes over, 176
257, 284
Korean war: Clandestine
Ser\'ices in, 20; intelligence
services in, 76; special
operations (paramilitary),
97, 100
Kerry. Edward M., 13, 15
Kraft. Joseph. 32, 271, 310. 327
Kwangtung province, 137-38
labor organizations, CIA
and, 42^3, 44-15, 342^3
Laird, Melvin, 88-89. 271-72
Land, Edwin, 286n. , 287
Langley, Va .. see CIA,
headquarters and other
buildings
Lansdale, Brig. Gen. Edward:
on CAT. 121-22, 129; CIA
operations, 25-26, 143
Laos: Armfe Clandestine,
29. 104. 106. 205; CIA in.
28-29, 37. 50. 53, 105. 122.
125. 132. 205-206. 215. 252.
253. 294. 298; Continental
Airlines in. 124-25; South
Vietnamese invasion, 90;
U.S. operations in, 206,
206n. . 253, 276-77, 294
La Paz, Bolivia, 113-14, 116
Latin America, 14-15; CIA
in, 109-11, 126, 135-36,
135n.-36n.. 163. 227-28
leakage of information, 271-73,
271n.
Ledcrer, William, J., and
Eugene Burdick, The Ugly
American, 25
Lee Kuan Yew. 255
Lendiris, Nick. 116
Lenin, Nikolai, 240
Leningrad, defense system, 270
Liberty (spy ship), 79. 175.
257. 284
Liddy, Gordon. 296n.
Little. Brown and Company. 156
Lockheed Aircraft Corporation.
32. 67
Lonsdale. Gordon. 156. 159-60
Look. 304. 308
Luce. Clare Booth. 286n.
Luce. Henry, 311
MacArthur. Gen. Douglas. 200
Index
359
McCone. John. 16. 83-84. 129.
becomes CIA Direcior. 27,
260; in Cuban missile
crisis. 263-65; press relations.
307-308. 312; resignation.
83
McCoy. Alfred, Thf Politics
of Heroin in Southeast Asia,
312
MacEachron, David W., 327
McGarvey. Patrick. CIA:
The Myth and the Madness,
257. 295
McNamara. Robert. 54, 56. 83.
263
McNeil. Wilfred. 56-57
M.igsaysay. Ramon. 25
Makanos. Archbishop. 292n.
Malta, 291, 292n.
Mao Tse-tung. 103. 141
Marighella. Carlos. 211-12
Martin, William. 169-70
Martinez, Eugenio. 50. 201
Massachusetts Institute of
Technology, Center for
International Studies. 153. 196
Maury, John, 188
Mexico City, 227, 228
Meyer. Assistant Secretary.
15
Meyer, Armin, 173
Meyer. Cord. Jr.. 312-13
Miami: CIA proprietary
agencies in. 120; Cuban
exiles in, 201
Miami Daily News, 315
Michigan State University, 197
Middle East, 187; espionage
in. 166. 289; peace talks. 172
Millikan. Max, 196
Mintoff, Dom, 291. 292n.
Minuteman missile, 185
missiles: ABM. 177, 269-72;
development, Soviet and
U.S., 184-85, 271-72. 273,
273n.; SAM, 263-64,
264n.-65n.
Mitchell. Bernon. 170
Mitchell. John. 12
Mobutu. Joseph, 28. 104
MOL (manned orbiting
laboratory), 86
Montmarin. Henri Marie
Fran<;ois de Marin de. 128.
129
Moorer, Adm. Thomas. 248n.
Moscow, defense system. 270
Mossadegh. Mohammed. 26
Mozambique. 127
Muller, Kurt, 77if Foreign
Aid Programs of the Soviet
Bloc and Communist
China, 153
Mulliken. John. 301. 311
Munich, broadcasts from. 146
Murray, Hugo, 116
Mussolini. Benito. 246
Nancahuazu, Bolivia. 112
Nasser, Gamal Abdel, 259
Nation, The, 306
National Committee for a
Free Europe. 1 19
National Intelligence
Estimates. 14-1 5, 58, 7 1, 72-73.
83. 261. 263. 268. 270
National Intelligence Resources
Board (NIRB). 87
National Photographic
Interpretation Center. 65,
234
National Reconnaissance
Office (NRO). 79. 174,284,288
National Security Act (1947),
7, 81, 188, 275, 276, 322, 340
National Security Advisor. 37
National Security Agency
(NSA). 22. 175. 211. 276-77,
287. 330. 343. 344; code
breaking and cryptology,
167-72; in Cuban operations,
262-63; Eaton's study of,
86-87; intelligence services,
79-80, 86-87, 175, 176;
360
Index
National Security Agency
(Cont.)
interception of messages,
171-72. KGB agents in, 183
National Security Council
(NSC), 20. 58. 248-50, 268;
and CIA functions. 7. 20. 37.
144. 278: intelligence
services controlled by. 91
National Security Intelligence
Directives (NSCIDs). 275-76
National Student Association,
CIA connections with, 41.
149, 151. 194. 197. 240. 281.
302, 343
Navy: in Cuban missile crisis,
262; intelligence services.
7f>-77. 81. missile-equipped
submarines. 269; SEALs. 96;
Security Service. 168; spy
ships. 175. 284; sec also
Liberty; Pueblo
Near East, see Middle East
Nedzi. Lucien. 292-93
Nepal, air transport for. 130-31
Net Assessment Group. 91
New China News Agency. 257
Newhouse. John. Cold
Dawn, 273n.
New Republic. The. 307
news media, CIA and. 299-316
Newsweek. 230. 312
New York, police trained by
CIA. 187-88
New York Herald Tribune, 314
New York Times, 22. 101.
104. 116. 133. 169n.. 187,
I90n., 207fi.. 213. 253.
271n., 272, 292. 305. 306-308.
308n.. 313-15, 344
Ngo Dinh Diem, 26, 101 ;
assassination, I43n.
Nguyen Van Thieu, 40. 208.
282. 310
Nicaragua, 97
Nigeria, 140
Nitze, Paul, 87-88
Nixon. Richard M.. 66. 209,
315n. ; and Chilean election,
1970. 16. 252. 319; and
domestic surveillance, I90n.,
276; and intelligence
programs. 88-92. 285; and
National Security Council.
248-50; in Watergate affair,
I7In.. 298
Nixon administration. 5. 18, 192,
26H, 271, 27 In., 276, 278,
310, 320
Nkrumah. Kwame. 239
North Carolina, CIA base. 97
Norway, air defense
equipment for, 54
Novotny. Antonin. 147, 340
nuclear weapons, testing, 73.
73/1.
Office of Management and
Budget (OMB), 53-54. 236;
CIA controlled by, 287-90
Office of Naval Intelligence, 79
Office of Policy Coordination
(OPC). 20. 275. 329. 341
Office of Special Operations,
20
Office of Strategic Services
(OSS), 7, 36, 141, 144 , 205,
236; guerrilla operations in
World War II, 19, 99, 100, 205
Office of War Information
(OWI), 141
Omnibus Crime Control and
Safe Streets Act (1968), 188
Opaloeka, Fla.. 109
Organization of American
States. 55
Pacific Corporation, 51, 52,
121, 123. 126. 132. 133
Pakistan. 256
Panama. 146; see also Canal
Zone
Panchen Lama, lOI. 103
Papich, Sam, 194
Index
361
Palhet Lao, 205, 215
Pavlichenko, Vladimir P.,
313
Pearson. Drew, 303
Penkovsky, Olcg, 8. 154-56, I5K,
160, IHI. 182, 224, 229-30,
264. 323
Penkovskv Papers, The, 154.
155-56'
Pentagon, 54. 177, 252,
266-69; contribution to CIA,
53, 67; in domestic
surx-eillance, 193; in
espionage, 167, 175-76,
1R4; in intelligence
community, 65, 73, 73n.,
80 . 83. 84, 86-88, 89-90, 92;
intelligence services.
Filzhugh recommendations
on, 76. 80, 89; missile
program, ABM, 269-72;
Project Camelot, 14;
universities and research,
connections with, 195; see
also Defense Department
Pentagon Papers, The, 26,
106, 121, 143, 271n., 315
people-to-people exchange
programs, 45-46
Peru, CIA in, 110
Peshawar, 256
Phllby, Harold ("Kim"), 156.
183, 184n.
Philippines: Huk insurgency,
100; Landsdale in, 25-26
PHOTINT (photograhic
intelligence), 82
"plumbers" group, 10, 64,
189, 210-11, 271n.,296n., ^15
Poland: broadcasts to, 146,
147; underground operations
attempted, 21
Polaris missile program, 79
Polaris submarine, 185
police, CIA training of, 187-89,
196
Pope, Allen. 26, 122n.
Portugal. 149. 249: aircraft
bought for use in Africa.
127-28
Poseidon missile program. 79
Powers. Franas Gary. U-2
mcident,5.9, 27, 32, 175,244,
256, 257, 264n. . 287. 306
Praeger, Frederick A.. 144
President, authority over
CIA. 37-38. 47. 251-53. 276.
277. 285
President's Daily Brief. 66
President's Foreign
Intelligence Advisory Board
(PFIAB). 285-87
press, CIA and. 299-316
Pntzlaff. John C, Jr.. 291
propaganda and disinformation.
131-57; balloons. 137-39;
black, white, and gray.
143-45; communist, 145;
defectors in, 151-53;
disinformation defined,
145; psychological warfare,
141-44; publications, 143-44,
152-57; radio broadcasts and
monitoring. 138-^1, 146-49
Proxmire, William, 199-20i
Pucci, Count Emilio, 246
Pueblo (spy ship). 79, 169, 175,
257, 284
Pyle, Christopher, 197
Quigg, Philip W., 327
Raborn, Adm. William, 57,
83-84
RADINT (radar intelligence), 82
radio: interception of messages,
168; propaganda broadcasts
and monitoring, 139-41, 146-49
Radio Americas, 119
Radio Free Europe (RFE), 21,
37, 44, 119, 121, 142, 146-49,
151; funds for, 146n., 14»-49
Radio Liberty (RL), 20, 37,
44, 119, 121, 142, 146-49
362
Index
Radio Swan. 119
Ramparts, 41. 98. 115. 195. 197,
241. 342
Random House. 308
Ransom, Harry Howe. 118,
327
Raus, Juri. 201
RB-17 spy plane, 175
Reston. James. 307
Reuther. Victor. 42, 45. 342
Reuther. Waller. 42. 45, 342
Rhodesia. 249
Roberts, Chalmers. 12; First
Rough Draft, 306
Roche. James, 148
Rockefeller, Nelson, 286n.
Rogers. William, 250n.
Rojas. Herbcrlo, 117
Romania, broadcasts lo. 146
Rooney, John. 55
Roosevelt. Kermii. 26
Ross. Thomas B.. 41. 308
Roslow, Walt, The Dynamics
of Soviet Society, 153, 1%
Rubins. Jerry, 305
Runge, Yevgeny, 159-60. 314
Russell. Richard. 56, 57. 293,
294 . 296
Saigon. 205, 208. 214, 244
Saipan, CIA installation, 97
Salinger. Pierre, 124
Salisbury, Harrison, 303-304
Salisbury, Rhodesia. 249
S.A.L.T. agreements, 10, 91,
269. 271n., 273, 273n.
SAM missiles. 263-64. 264n.
San Francisco. 140
satellites, reconnaissance. 6.
32. 67. 79, 82, 83. 330; in
espionage, 167, 174-76.
184-85
Saturday Evening Post, 42, 44
Saturday Review. \23n.
Schlesinger. James, 56n. . 68,
78n..90,92, 189, 198.209.268
Scoville. Herbert, Jr.. 271
Senate Appropriations
Committee, 293
Senate Armed Services
Committee, 68, 292, 293,
295n.
Senate Foreign Relations
Committee, 56n. ,7ln. ,92. 149.
189. 271, 293, 295n.
Sidey. Hugh. 312
SIGINT (signal intelligence).
82
Silben. Earl. 210-11
Singapore. 254-55, 283
Smith. Sumner, 119
Smith, Gen Walter Bedell. 20,
58, 329, 341-12
socialist movements, 23
Son Tay camp, 90, 90n.
Sorensen. Theodore C. 32, 327
South Africa. 249
Southern Air Transport. 26.
121, 122n., 126. 130, 134n..
135-36, 200
Soviet Union. 21-22, 23, 69,
82-83; balloon propaganda
in, 137; books critical of.
153-57; CIA failures in, 21-22,
99; CIA surveillance in, 6,
8,9,32, 256. 322; i« abo U-2
spy plane; counterespionage.
178-87, 323; Cuban missile
crisis, 155, 246. 261-65. 286.
308, 315; Cuban sugar for, 46;
Czechoslovakia invaded.
177 , 286; defectors from,
158-61, 182, 183. 314;
defectoreto, 169-70, 183; and
dissident groups in U.S..
192; espionage against, 158-60.
167. 168-69, 174-76, 330-32;
espionage by, 169-70. 178,
313-14; GRU. 181;
intelligence reports on . 265-67.
269-71, 272-73; KGB. 6. 8,
13.77, 114. 145. 154, 156, 160.
163. 178-86. 193. 201, 221.
229. 309. 313.314,317;
Index
363
Soviet Union (Con't.)
missiles. 184-85, 263-M,
2Mn. , 264-65, 268-7 1 , 272 ,273,
273n.; and Pcnicovsky case,
154-55: propaganda, 141, 145;
radio broadcasts to, 146,
150; reconnaissance of U.S..
6; in U.N., protests against
sale of aircraft to Portugal.
127-28; U.N. officials of,
accused of spying, 313-14
Spain, broadcasts from, 146
special operations (para-
military). 95-117
Sputnik. 184
SR-71 spy plane (A-ll). 32.
67, 86, 167, 176, 257, 284
Stalin, Svetlana, 182
Stanton, Frank, 148
State Department. 15. 18. 55. 59.
64, 65-66. 124. 128, 140. 176.
209n., 231. 244. 258.267,280.
284. 321, 328; and Brazilian
airplane hijacking, 212; in
Chilean election. I4n.;
communications, protection
of, 173, 186; cryplanalytical
section, 167; in intelligence
community. 70. 71. 80-81,
87; Middle East peace talks,
173; and nuclear weapon
testing, 73n.; people-to-
people exchange programs.
45-46; and Soviet missiles. 269
Steakley, Brig. Gen.. 79
Stennis, John, 293, 298-99, 322
Stern, Laurence, 14n., 190
Sternfeld, Larry, 1 16
Stevenson, Adiai, 128
Stimson, Henry, 167
Strauss, Lewis, 332
Studies in Inielligence, 246
Sukarno, Achmed, 26, 36-37,
101, 122, 145, 254. 259
Sullivan, William, 194
Sumatra, 26
Swan Island radio station, 1 19
Symington, Stuart, 266n. , 276,
277, 293-94; amendment to
limit intelligence spending,
293-94; subcommittee on
American L-ommitnienis
abroad. 168
Syria, 219
Szulc, Tad. 17. 90n., 260/i., 307
Taipei, 123, 124
Taiwan, 39-40, 41, 226; air
transport for, 121-23, 126;
broadcasts from, 139. 146;
propaganda balloons from,
138-39; technical espionage
installations in. 256-57; see
also China, Nationalist
Tania, Soviet agent, 114
Taylor, Gen. Maxwell. 27-28.
121. 285
Taylor. Adm. Rufus. 70. 85
Teheran. 173
telephones, tapping. 162-63.
172-73
Teller. Edward. 286n.
Teran. Mario. 1 16
Thailand. 105. 125
Thieu. see Nguyen Van Thieu
Third World. 9. 196. 216. 255.
318; CIA operations in, 24,
32. 40. 132. 320. 323. 332
Thomas. B. Brooks. 313
Thomsen. Roszel C. Judge. 201
Thuermer. Angus. 187-88
Tibet. 97; air support for. 122,
129; revolt against China,
101-104, 127. 308
Time. 301. 305. 311-12
Time, Inc.. 157
Tonkin Gulf. 105. 175
Tonkin Gulf resolution. 105,
125, 205
Tran Ngoc Buu, 45
Treasury Department, 55, 81
Truman, David B.. 327
Truman, Harry S. 274; CIA
established by, 7, 19-20, 275
364
Index
Tucson, Ariz., 127
Tyson's Corner, Va., 235
U-2 spy plane, 6, 22, 32, 67.
82-83, 155, 167, 175. 184-85,
256, 257. 287. 328-29. 334;
Cuban Hights. 262, 263-64,
264n,, Powers's mission, 5, 9,
27.32.175.241.256, 257,
264n., 287 . 306
Udorn. Thailand. 125
Ukraine, guerrilla movement
allempled. 99
Union Carbide. 249
United Nations, 249. 251;
protests against sale of
aircraft to Portugal. 127-28;
Soviet officials called spies,
313-14
United States Information
Agency (USIA), 45, 124,
149, 321
United States Intelligence
Board (USIB), 15, 71-76, 78,
81 , 174, 270. 272; in Cuban
missile crisis. 261-63; Watch
Report. 71-72
universities. CIA connections
with. 50-51, 195-98, 238
Vang Pao, Gen., 105
Vanguard Service Corporation,
119-20
Verification Panel, 91
Vienna, 224
Vientiane, 105
Vietcong, 106; CIA tactics
against. 206-207
Vietminh, 143
Vietnam. 291, 315; air
transportation in, 125. 132;
black-market currency,
208-209, 214; CIA in, 29,
37, 46, 50, 101. 105-107.
206-209; Counter Terror
(CT) program. 206;
intelligence services in, 76;
International Supervisory and
Control Commission, 125;
Japanese investments in. 46;
Johnson administration in.
5. 206. 209n; labor movement,
45; Lansdale in. 26. 143;
Laos invaded by South Viet-
namese. 90; Nungs. 106-107;
Phoenix counterintelli-
gence program. 17, 207,
207n.; police-training
program. 197; Provincial
Inlerrogation Centers,
206-207; Provincial
Reconnaissance Units
(PRUs), 206-207; U.S.
commitment in, 253
Vietnam. North, 28, 29; Chinese
support of. 138; CIA
operations in. 104-105,
20S-206; CIA propaganda
in. 143; espionage against,
166; refugees, 122; Son Tay
Camp, 90, 90n.
Wall Siren Journal. 152
Washington, DC, CIA
buildings, 234-36
Washington Monthly, 193
Washington Post, 90. 279-80,
305n. , 306
Washington Star-News, 304
Watergate burglary, 18, 50.
189-90. 213
Watergate scandal, 171n. ,
189-90, 209-1 1,319, 322; CIA
in. 9-10, 189-90, 298, 315;
Congress and, 293, 298;
hearings, 190, 193n.
weapons, outlawed, training
with. 98
weapons-detection system. 107
Welles. Benjamin. 314-15
Whalen. Lieut Col. W. H..
184-85
Wheelon. Albert ("Bud"). 83,
296
Index
365
Wicker, Tom. 300. 315
Wise, David. 41, 118. 207n..
310. 314; The PolilKs of
Lying. 308
Wise, David, and Thomas
Ross, The Invisible
Governmenl. 308-309
Wisner, Frank G.. 20, 244.
303, 329, 341
World War II:
counter-espionage, I7R:
intelligence services, 167;
OSS guerrilla operations, 19,
99. 100, 205: propaganda.
141
Wynne. Grevillc. Contact on
Gorky Street. 156
Yemen. Soviet forces in. 262
Young, Milton, 155
Zaire (Democriitic Republic
of the Congo), 1 1 1
Zorza. Victor. 156